SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains
نویسندگان
چکیده
Transport protocols for Wireless Sensor Networks (WSNs) are designed to fulfill both reliability and energy efficiency requirements. Distributed Transport for Sensor Networks (DTSN) [1] is one of the most promising transport protocols designed for WSNs because of its effectiveness; however, it does not address any security issues, hence it is vulnerable to many attacks. The first secure transport protocol for WSN was the secure distributed transport protocol (SDTP) [2], which is a security extension of DTSN. Unfortunately, it turns out that the security methods provided by SDTP are not sufficient; some tricky attacks get around the protection mechanism. In this paper, we describe the security gaps in the SDTP protocol, and we introduce SDTP for patching the weaknesses. We show that SDTP resists attacks on reliability and energy efficiency of the protocol, and also present an overhead analysis for showing its effectiveness.
منابع مشابه
Securing On-Demand MANET Routing Protocols Using IOMT
Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node is consistent with routing information assimilated by a node. MANET nodes accumulate routing information that needs to be stored within them self. For this we present an idea of using IOMTs to prevent a node from misrepresenting or hiding this accumulated information., During routing pr...
متن کاملMessage and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks
In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages ...
متن کاملA Robust Pairwise Key Predistribution Scheme Resistant to Common Attacks for Wireless Sensor Networks
Security is very necessary for secure operations in wireless sensor networks (WSNs), especially in hostile environments. To achieve security, key agreement needs to be implemented efficiently among communicating nodes. Nonetheless, acquiring such key agreement in WSNs becomes extremely intricate due to resource constraints. Among approaches so far, key predistribution approach is considered as ...
متن کاملSecuring Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...
متن کاملEfficient Memory Integrity Verification Schemes for Secure Processors
Single Chip Secure Processors have recently been proposed for variety of applications ranging from anti-piracy to trusted execution of distributed processes. Off-chip memory integrity verification and encryption are two fundamental tasks of a single-chip secure processor. Memory integrity verification is regarded as the main bottleneck in improving the performance of secure processors. Differen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013