scispace - formally typeset
Journal ArticleDOI

Multilevel μTESLA: Broadcast authentication for distributed sensor networks

TLDR
The development of a scalable broadcast authentication scheme based on μTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution, and the experimental results obtained through simulation are presented.
Abstract
Broadcast authentication is a fundamental security service in distributed sensor networks. This paper presents the development of a scalable broadcast authentication scheme named multilevel μTESLA based on μTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multilevel μTESLA satisfies several nice properties, including low overhead, tolerance of message loss, scalability to large networks, and resistance to replay attacks as well as denial-of-service attacks. This paper also presents the experimental results obtained through simulation, which demonstrate the performance of the proposed scheme under severe denial-of-service attacks and poor channel quality.

read more

Citations
More filters
Proceedings ArticleDOI

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks

TL;DR: TinyECC is presented, a ready-to-use, publicly available software package for ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications and shows the impacts of individual optimizations on the execution time and resource consumptions.
Journal ArticleDOI

A survey of security issues in wireless sensor networks

TL;DR: This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
Book ChapterDOI

Wireless Sensor Network Security: A Survey

TL;DR: This work surveys the major topics in wireless sensor network security, and presents the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures.
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.
Posted Content

A Survey on Wireless Sensor Network Security

TL;DR: In this article, the current state of the art in security mechanisms for WSNs is discussed and their countermeasures presented, as well as a brief discussion on the future direction of research in WSN security.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Journal ArticleDOI

System architecture directions for networked sensors

TL;DR: Key requirements are identified, a small device is developed that is representative of the class, a tiny event-driven operating system is designed, and it is shown that it provides support for efficient modularity and concurrency-intensive operation.
Proceedings ArticleDOI

Random key predistribution schemes for sensor networks

TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.