Mitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks
نویسندگان
چکیده
Broadcast authentication is a critical security service in wireless sensor networks. There are a number of benefits to provide broadcast authentication with digital signatures, such as immediate authentication capability and the ease of managing cryptographic keys, compared with the alternative of TESLA-based approaches. Though previously considered infeasible, recent results have demonstrated that it is possible to perform public key cryptography on resource constrained sensor nodes efficiently. However, using digital signatures for broadcast authentication still faces a great challenge of denial of service (DoS) attacks: An attacker can inject bogus broadcast packets to force sensor nodes to perform expensive signature verifications, and thus exhaust their limited battery power. This paper presents an efficient mechanism called message specific puzzle to mitigate such DoS attacks. In addition to a digital signature, this approach adds a weak authenticator in each broadcast packet, which can be efficiently verified by a regular sensor node, but takes a computationally powerful attacker a substantial amount of time to forge. Upon receiving a broadcast packet, each sensor node first verifies the weak authenticator, and performs the expensive signature verification operation only when the weak authenticator is valid. A weak authenticator cannot be pre-computed without a non-reusable key disclosed only in a valid broadcast packet. As a result, an attacker cannot start the expensive computation to forge a weak authenticator without seeing a valid broadcast packet. Even if an attacker has sufficient computational resources to forge one or more weak authenticators, it is difficult to reuse these forged weak authenticators. Thus, this weak authentication mechanism substantially increases the difficulty of launching successful DoS attacks against signature verifications. This paper also reports an implementation (called TinySigGuard) of the proposed techniques on TinyOS, as well as the experimental evaluation in a network of MICAz motes.
منابع مشابه
Toward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملSecuring Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
Timed Efficient Stream Loss-tolerant Authentication (TESLA) and digital signature are security implementations of broadcast authentication in Wireless Sensor Networks (WSNs). Both approaches, however, are considered vulnerable to DoS attacks. Encountering this attack requires a scheme that addresses two security measures: prevention and detection.. This paper provides a hybrid solution between ...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملSecuring Wireless Sensor Networks against Broadcast Service Attacks
Attacks against broadcast services in wireless sensor networks will have the most catastrophic effects on power and other resource consumptions. As bogus broadcast packets are propagated through sensor nodes without being filtered out, sensor nodes will waste their resources such as power and memory on transmitting and buffering those false packets. In networks where complex Denial-ofService (D...
متن کاملMulti-User Broadcast Authentication Protocol in Wireless Sensor Networks against DoS Attack
In order to achieve the multi-user broadcast authentication in WSNs (Wireless Sensor Networks) defending against DoS (Denial-of-Service) attack, a multi-user broadcast authentication protocol in WSNs was proposed based on the improved ECDSA (Elliptic Curve Digital Signature Algorithm) with partial message recovery. The authenticity of the user public key is verified by using bloom filter, which...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005