Book ChapterDOI
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs
Alessio Di Mauro,Xenofon Fafoutis,Sebastian Mödersheim,Nicola Dragoni +3 more
- pp 1-16
TLDR
This paper proposes RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack, and provides an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion.Abstract:
In receiver-initiated MAC protocols for Wireless Sensor Networks WSNs, communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we provide an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion.read more
Citations
More filters
Journal ArticleDOI
Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments
TL;DR: Empirical validation results on packet captures in which attacks were inserted show that the Dense RNN correctly detects attacks.
Book ChapterDOI
Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments
Olivier Brun,Olivier Brun,Yonghua Yin,Erol Gelenbe,Y. Murat Kadioglu,Javier Augusto-Gonzalez,Manuel Ramos +6 more
TL;DR: Empirical validation results on packet captures in which attacks were inserted show that the Dense RNN correctly detects attacks.
Proceedings ArticleDOI
Extending the battery lifetime of wearable sensors with embedded machine learning
Xenofon Fafoutis,Letizia Marchegiani,Atis Elsts,James Pope,Robert J. Piechocki,Ian J Craddock +5 more
TL;DR: Focusing on a simple classification task and using an accelerometer-based wearable sensor, it is demonstrated that embedded machine learning has the potential to reduce the radio and processor duty cycle by several orders of magnitude; and, thus, substantially extend the battery lifetime of resource-constrained wearable sensors.
Journal ArticleDOI
Receiver-initiated medium access control protocols for wireless sensor networks
TL;DR: A comprehensive and self-contained introduction to the fundamentals of the receiver-initiated paradigm is provided, providing newcomers with a quick-start guide on the state of the art of this field and a palette of options, essential for implementing applications or designing new protocols.
Proceedings ArticleDOI
Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation
TL;DR: This paper provides models to estimate the effect of attacks that attempt to deplete the node's energy supply, and examines a simple means of attack mitigation based on dropping both attack and "good" traffic.
References
More filters
Proceedings ArticleDOI
Energy-efficient communication protocol for wireless microsensor networks
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Energy-efficient communication protocols for wireless microsensor networks
TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI
Secure routing in wireless sensor networks: attacks and countermeasures
Chris Karlof,David Wagner +1 more
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Journal Article
Security for Sensor Networks
TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Related Papers (5)
Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets
Vandana Sharma,Muzzammil Hussain +1 more
Attacking and securing beacon-enabled 802.15.4 networks
Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
C. Anand,R. K. Gnanamurthy +1 more