Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks
Citations
804 citations
492 citations
244 citations
Additional excerpts
...For example, in 2017, the IoT attacks such as Distributed Denial of Service (DDoS) become very spread and grow up to 172%, which gain much interest in the IoT network [2]....
[...]
...See https://www.ieee.org/publications/rights/index.html for more information. in the IoT, the most dangerous and challenging widespread hazardous threats are man-in-the-middle (MITM) dangerous threats with DDoS [7]–[9]....
[...]
...in the IoT, the most dangerous and challenging widespread hazardous threats are man-in-the-middle (MITM) dangerous threats with DDoS [7]–[9]....
[...]
...Their proposed ID system [11] used the virtual private network (VPN) for secure communication between the IoT devices, and the system was able to use challenge-response authentication for the protection of the VPN server and keep protect from hazardous DDoS attacks in IoT....
[...]
214 citations
Cites background from "Defending DoS Attacks on Broadcast ..."
...Actually, some works on Wireless Sensor Networks can be used for reference, such as [4-9]....
[...]
204 citations
Cites background from "Defending DoS Attacks on Broadcast ..."
...presented an effective scheme to defend DoS attack on broadcast authentication in sensor networks [38]....
[...]
References
5,378 citations
"Defending DoS Attacks on Broadcast ..." refers background in this paper
...The implementation of 160-bit ECC on Atmel ATmega128, a CPU of 8 MHz and 8 bits, shows that an ECC point multiplication takes about 0.81 seconds [4]....
[...]
...However, the recent progress on Elliptic Curve Cryptography (ECC) [3] provides new opportunities to utilize public-key cryptography in sensor networks....
[...]
2,461 citations
2,267 citations
1,697 citations
1,113 citations