scispace - formally typeset
Proceedings ArticleDOI

Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks

Reads0
Chats0
TLDR
This paper presents an effective and efficient scheme that can defend such DoS attack on broadcast authentication, and performance evaluation shows that the scheme is much more secure and efficient than an existing scheme.
Abstract
Security is critical for wireless sensor networks deployed in military, homeland security and other hostile environments. In this paper, we study a security issue related with broadcast in sensor networks. Due to the broadcast nature of wireless communications, often it is more efficient to broadcast packets to sensor nodes. Typically, broadcast authentication is achieved by digital signatures. Since digital signature operations are expensive for small sensor nodes, an attacker can launch a serious denial of service (DoS) attack. That is, an attacker may forge a large number of broadcast messages with digital signatures, and then force sensor nodes to verify these signatures, which can cause them run out of power. In this paper, we present an effective and efficient scheme that can defend such DoS attack on broadcast authentication. Our performance evaluation shows that the scheme is much more secure and efficient than an existing scheme.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Journal ArticleDOI

Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges

TL;DR: This article investigates, highlight, and report premier research advances made in IoT architecture recently, categorize and classify IoT architectures and devise a taxonomy based on important parameters such as applications, enabling technologies, business objectives, architectural requirements, network topologies, and IoT platform architecture types.
Journal ArticleDOI

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques

TL;DR: A new framework model based on a novel feature selection metric approach named CorrAUC is proposed, and a new feature selection algorithm based on the wrapper technique to filter the features accurately and select effective features for the selected ML algorithm by using the area under the curve (AUC) metric.
Journal ArticleDOI

Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid

TL;DR: An efficient and secure data acquisition scheme based on ciphertext policy attribute-based encryption that can fulfill the security requirements of the Cloud-IoT in smart grid and effectively reduce the time cost compared with other popular approaches.
Journal ArticleDOI

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

TL;DR: This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and it has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV).
References
More filters
Book ChapterDOI

Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs

TL;DR: To accelerate multiple-precision multiplication, a new algorithm to reduce the number of memory accesses is proposed and implemented elliptic curve point multiplication for 160-bit, 192- bit, and 224-bit NIST/SECG curves over GF(p), RSA-1024 and RSA-2048 on two 8-bit microcontrollers.
Proceedings Article

Using Directional Antennas to Prevent Wormhole Attacks.

TL;DR: A cooperative protocol whereby nodes share directional information to prevent wormhole endpoints from masquerading as false neighbors is presented, which greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.
Proceedings Article

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Donggang Liu, +1 more
TL;DR: A novel technique to replace the unicast-based initialization with a broadcast-based one is presented, which satisfies several nice properties, including low overhead, tolerance of message loss, scalability to large networks, and resistance to replay attacks as well as some known Denial of Service (DOS) attacks.
Journal ArticleDOI

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

TL;DR: This paper presents an efficient mechanism called message-specific puzzle to mitigate DoS attacks against signature-based or μTESLA-based broadcast authentication, which adds a weak authenticator in each broadcast packet, which can be efficiently verified by a regular sensor node, but takes a computationally powerful attacker a substantial amount of time to forge.
Related Papers (5)