scispace - formally typeset
Proceedings ArticleDOI

Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism

Sung-Hyung Lee, +1 more
- pp 1417-1421
TLDR
Results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.
Abstract
This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication. We evaluate the safety of the proposed protocol by the security analysis and compare the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

read more

Citations
More filters
Patent

Mitigation of application-level distributed denial-of-service attacks

TL;DR: In this paper, a system and method, implementable using an authenticating device, are provided for authenticating requesting devices such as mobile devices and other communication devices over a network, where at least one group shared secret is provisioned on a plurality of requesting devices, which are further provided with other authentication credentials such as a shared secret for full authentication by the authenticated device.
Proceedings ArticleDOI

Efficient lightweight mechanism for node authentication in WBSN

TL;DR: This work provides a scheme to enable trust based authentication of sensing nodes within the connected health network to collect real-time biomedical data through intelligent medical sensors in or around the patients' body.
Proceedings ArticleDOI

The authentication method in wireless sensor network based on trust model

TL;DR: The method of sensor authentication in the wireless sensor networks, which is based on a model of trust, is proposed, which will occupy a dominant place among the data collection and communication.
Proceedings ArticleDOI

Inducing data loss in Zigbee networks via join/association handshake spoofing

TL;DR: A denial-of-service attack which exploits this fact to convince an end device to send its data to a rogue device on a different channel rather than the actual coordinator and a solution that uses challenge-response based authentication to mitigate the attack is proposed.
Book ChapterDOI

An identity-based authentication protocol for clustered ZigBee network

TL;DR: This paper has proposed an Identity-based authentication protocol for a ZigBee network structured to have multiple clusters consisting of one coordinator and many devices, and designed a secure protocol used for exchanging public parameters between two clusters.
References
More filters
Journal ArticleDOI

A survey of security issues in wireless sensor networks

TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.

Key distribution mechanisms for wireless sensor networks : a survey

TL;DR: This work evaluates deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys in distributed and hierarchical wireless sensor networks.
Related Papers (5)