Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks

被引:0
|
作者
Xiong, Kaiqi [1 ]
Wang, Ronghua [2 ]
Du, Wenliang [3 ]
Ning, Peng [4 ]
机构
[1] Rochester Inst Technol, Coll Comp & Informat Sci, Rochester, NY 14623 USA
[2] Microsoft Corp, Richmond, WA 98052 USA
[3] Syracuse Univ, Dept Elect & Engn & Comp Sci, Syracuse, NY 13210 USA
[4] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Security; Design; Algorithms; Broadcast authentication; bogus packet insertion attack; AIMD; sensor networks; energy consumption; broadcast delay; SERVICE;
D O I
10.1145/2240092.2240094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast is a critical communication primitive in wireless sensor networks. The multihop nature of sensor networks makes it necessary for sensor nodes to forward broadcast messages so that the messages can reach an entire network. Authentication of broadcast messages is an important but challenging problem in sensor networks. Public key cryptography (PKC) has been used recently to address this problem. However, PKC-based authentication techniques are susceptible to bogus packet insertion attacks in which attackers keep broadcasting bogus messages and force resource-constrained sensor nodes to forward such messages. Moreover, because it takes time to do signature verifications, it is impractical for each node to authenticate every received message before forwarding it. In this article, we propose a dynamic window scheme to thwart the aforementioned bogus packet insertion attacks which permits sensor nodes to efficiently broadcast messages. Within this scheme, a sensor node has the ability to determine whether or not to verify an incoming message before forwarding the message. We further study the property of this dynamic window scheme and investigate the best strategy for thwarting bogus packet insertion attacks. We propose three strategies for finding the optimal parameters by an improved additive increase multiplicative decrease (AIMD) window updating function so that the proposed dynamic window scheme can achieve the best overall performance with respect to the authentication and forwarding times of messages. Numerical validations show that our proposed scheme performs very well in terms of energy saving and broadcast delays based on three different metrics, including average authentication delays, the percentage of nodes receiving fake messages, and the percentage of nodes forwarding fake messages.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks
    Wang, Ronghua
    Du, Wenliang
    Ning, Peng
    MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2007, : 71 - 79
  • [2] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [3] Defending DoS attacks on broadcast authentication in wireless sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hsiao-Hwa
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1653 - +
  • [4] Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks
    Dong, Qi
    Liu, Donggang
    Ning, Peng
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12 (03)
  • [5] Enhancing Broadcast Authentication in Sensor Networks
    Norouzi, Arayeh
    Abhari, Abdolreza
    Yang, Truman
    14TH COMMUNICATIONS AND NETWORKING SYMPOSIUM 2011 (CNS 2011) - 2011 SPRING SIMULATION MULTICONFERENCE - BK 3 OF 8, 2011, : 125 - 132
  • [6] An authentication scheme for filtering injected bogus data in sensor networks
    Kim, Yong Ho
    Lee, Dong Hoon
    COMPUTER COMMUNICATIONS, 2008, 31 (17) : 3929 - 3932
  • [7] On broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zeng, Kai
    Moran, Patrick J.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4136 - 4144
  • [8] Secure and Efficient Broadcast Authentication in Wireless Sensor Networks
    Kwon, Taekyoung
    Hong, Jin
    IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (08) : 1120 - 1133
  • [9] Practical broadcast authentication protocol for sensor networks
    Du Z.-Q.
    Shen Y.-L.
    Ma J.-F.
    Zhou L.-H.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2010, 37 (02): : 305 - 310+325
  • [10] Broadcast authentication in sensor networks using compressed Bloom filters
    Chen, Yu-Shian
    Lin, I-Lun
    Lei, Chin-Laung
    Liao, Yen-Hua
    DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, 2008, 5067 : 99 - 111