Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks

被引:0
|
作者
Xiong, Kaiqi [1 ]
Wang, Ronghua [2 ]
Du, Wenliang [3 ]
Ning, Peng [4 ]
机构
[1] Rochester Inst Technol, Coll Comp & Informat Sci, Rochester, NY 14623 USA
[2] Microsoft Corp, Richmond, WA 98052 USA
[3] Syracuse Univ, Dept Elect & Engn & Comp Sci, Syracuse, NY 13210 USA
[4] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Security; Design; Algorithms; Broadcast authentication; bogus packet insertion attack; AIMD; sensor networks; energy consumption; broadcast delay; SERVICE;
D O I
10.1145/2240092.2240094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast is a critical communication primitive in wireless sensor networks. The multihop nature of sensor networks makes it necessary for sensor nodes to forward broadcast messages so that the messages can reach an entire network. Authentication of broadcast messages is an important but challenging problem in sensor networks. Public key cryptography (PKC) has been used recently to address this problem. However, PKC-based authentication techniques are susceptible to bogus packet insertion attacks in which attackers keep broadcasting bogus messages and force resource-constrained sensor nodes to forward such messages. Moreover, because it takes time to do signature verifications, it is impractical for each node to authenticate every received message before forwarding it. In this article, we propose a dynamic window scheme to thwart the aforementioned bogus packet insertion attacks which permits sensor nodes to efficiently broadcast messages. Within this scheme, a sensor node has the ability to determine whether or not to verify an incoming message before forwarding the message. We further study the property of this dynamic window scheme and investigate the best strategy for thwarting bogus packet insertion attacks. We propose three strategies for finding the optimal parameters by an improved additive increase multiplicative decrease (AIMD) window updating function so that the proposed dynamic window scheme can achieve the best overall performance with respect to the authentication and forwarding times of messages. Numerical validations show that our proposed scheme performs very well in terms of energy saving and broadcast delays based on three different metrics, including average authentication delays, the percentage of nodes receiving fake messages, and the percentage of nodes forwarding fake messages.
引用
收藏
页数:30
相关论文
共 50 条
  • [21] Multi-Sender Broadcast Authentication in Wireless Sensor Networks
    Gao, Ya
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 633 - 637
  • [22] Directed Broadcast with Overhearing for Sensor Networks
    Jurdak, Raja
    Ruzzelli, Antonio G.
    O'Hare, Gregory M. P.
    Higgs, Russell
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 6 (01)
  • [23] Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks
    Afianti, Farah
    Wirawan
    Suryani, Titiek
    SENSORS, 2018, 18 (11)
  • [24] Key Predistribution Based Broadcast Authentication Scheme for Wireless Sensor Networks
    Liu, Yongsheng
    Li, Jie
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 559 - 564
  • [25] Broadcast Authentication Scheme Based on Tornado Code for Wireless Sensor Networks
    Zhang, Jianmin
    Cui, Qingmin
    Liu, Xiande
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 365 - +
  • [26] Bogus data filtering in sensor networks
    Kim, Yong Ho
    Park, Jong Hwan
    Lee, Dong Hoon
    Lim, Jongin
    EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 629 - +
  • [27] ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks
    Luo, Yuling
    Liu, Yunqi
    Liu, Junxiu
    Ouyang, Xue
    Cao, Yi
    Ding, Xuemei
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (09):
  • [28] Sensor Authentication in Collaborating Sensor Networks
    Bielefeldt, Jake
    Chellappan, Sriram
    2014 13TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET), 2014,
  • [29] Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks
    Chuchaisri, Panoat
    Newman, Richard
    MOBILE NETWORKS & APPLICATIONS, 2012, 17 (04) : 508 - 525
  • [30] An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks
    Guo, Rui
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    Zhao, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (06): : 977 - 985