Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
نویسندگان
چکیده
Timed Efficient Stream Loss-tolerant Authentication (TESLA) and digital signature are security implementations of broadcast authentication in Wireless Sensor Networks (WSNs). Both approaches, however, are considered vulnerable to DoS attacks. Encountering this attack requires a scheme that addresses two security measures: prevention and detection.. This paper provides a hybrid solution between prevention and detention scheme., namely Combined Prevention and Detection Scheme (CPDS). The prevention part is based on the dynamic window scheme installed at each sensor node. The detection part adopts the Fuzzy Logic Intrusion Detection Scheme (FL-IDS) installed at monitor nodes. Both parts work coherently where the detection part relies on predefined information provided by the prevention part. The evaluation metrics includes the average broadcast delay of authentic messages and the energy consumption. The implemented CPDS scheme improved the average broadcast delay of authentic messages by 75% and 43% compared to Authentication first mode and Dynamic window scheme respectively. In terms of energy consumption, CPDS was evidently more efficient by 60% and 30% compared to Authentication first mode and Dynamic window scheme respectively.
منابع مشابه
Securing Wireless Sensor Networks against Broadcast Service Attacks
Attacks against broadcast services in wireless sensor networks will have the most catastrophic effects on power and other resource consumptions. As bogus broadcast packets are propagated through sensor nodes without being filtered out, sensor nodes will waste their resources such as power and memory on transmitting and buffering those false packets. In networks where complex Denial-ofService (D...
متن کاملMulti-User Broadcast Authentication Protocol in Wireless Sensor Networks against DoS Attack
In order to achieve the multi-user broadcast authentication in WSNs (Wireless Sensor Networks) defending against DoS (Denial-of-Service) attack, a multi-user broadcast authentication protocol in WSNs was proposed based on the improved ECDSA (Elliptic Curve Digital Signature Algorithm) with partial message recovery. The authenticity of the user public key is verified by using bloom filter, which...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کامل“EIBAS: an efficient identity broadcast authentication scheme in wireless sensor networks”
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication scheme based on Tso et al.’s IBS scheme with message recovery to achieve security requirements in wireless sensor networks. They claim that their scheme can achieve security requirements and mitigated DOS attack by limiting the times of signature verification failures in wireless sensor networks (WSN). However, w...
متن کاملAnalysis of En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks
In wireless sensor networks, adversaries can injectfalse data reports via compromised nodes and launch DoS attacks against legitimate reports. Recently, a number of filtering schemes against false reports have been proposed. However, they either lack strong filtering capacity or cannot support highly dynamic sensor networks very well. Moreover, few of them can deal with DoS attacks simultaneous...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015