scispace - formally typeset
Book ChapterDOI

Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

TLDR
This paper proposes RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack, and provides an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion.
Abstract
In receiver-initiated MAC protocols for Wireless Sensor Networks WSNs, communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we provide an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion.

read more

Citations
More filters
Journal ArticleDOI

Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments

TL;DR: Empirical validation results on packet captures in which attacks were inserted show that the Dense RNN correctly detects attacks.
Book ChapterDOI

Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments

TL;DR: Empirical validation results on packet captures in which attacks were inserted show that the Dense RNN correctly detects attacks.
Proceedings ArticleDOI

Extending the battery lifetime of wearable sensors with embedded machine learning

TL;DR: Focusing on a simple classification task and using an accelerometer-based wearable sensor, it is demonstrated that embedded machine learning has the potential to reduce the radio and processor duty cycle by several orders of magnitude; and, thus, substantially extend the battery lifetime of resource-constrained wearable sensors.
Journal ArticleDOI

Receiver-initiated medium access control protocols for wireless sensor networks

TL;DR: A comprehensive and self-contained introduction to the fundamentals of the receiver-initiated paradigm is provided, providing newcomers with a quick-start guide on the state of the art of this field and a palette of options, essential for implementing applications or designing new protocols.
Proceedings ArticleDOI

Energy Life-Time of Wireless Nodes with Network Attacks and Mitigation

TL;DR: This paper provides models to estimate the effect of attacks that attempt to deplete the node's energy supply, and examines a simple means of attack mitigation based on dropping both attack and "good" traffic.
References
More filters
Proceedings ArticleDOI

Energy-efficient communication protocol for wireless microsensor networks

TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.

Energy-efficient communication protocols for wireless microsensor networks

TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Journal Article

Security for Sensor Networks

TL;DR: This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Related Papers (5)