Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks

被引:0
|
作者
Xiong, Kaiqi [1 ]
Wang, Ronghua [2 ]
Du, Wenliang [3 ]
Ning, Peng [4 ]
机构
[1] Rochester Inst Technol, Coll Comp & Informat Sci, Rochester, NY 14623 USA
[2] Microsoft Corp, Richmond, WA 98052 USA
[3] Syracuse Univ, Dept Elect & Engn & Comp Sci, Syracuse, NY 13210 USA
[4] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Security; Design; Algorithms; Broadcast authentication; bogus packet insertion attack; AIMD; sensor networks; energy consumption; broadcast delay; SERVICE;
D O I
10.1145/2240092.2240094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast is a critical communication primitive in wireless sensor networks. The multihop nature of sensor networks makes it necessary for sensor nodes to forward broadcast messages so that the messages can reach an entire network. Authentication of broadcast messages is an important but challenging problem in sensor networks. Public key cryptography (PKC) has been used recently to address this problem. However, PKC-based authentication techniques are susceptible to bogus packet insertion attacks in which attackers keep broadcasting bogus messages and force resource-constrained sensor nodes to forward such messages. Moreover, because it takes time to do signature verifications, it is impractical for each node to authenticate every received message before forwarding it. In this article, we propose a dynamic window scheme to thwart the aforementioned bogus packet insertion attacks which permits sensor nodes to efficiently broadcast messages. Within this scheme, a sensor node has the ability to determine whether or not to verify an incoming message before forwarding the message. We further study the property of this dynamic window scheme and investigate the best strategy for thwarting bogus packet insertion attacks. We propose three strategies for finding the optimal parameters by an improved additive increase multiplicative decrease (AIMD) window updating function so that the proposed dynamic window scheme can achieve the best overall performance with respect to the authentication and forwarding times of messages. Numerical validations show that our proposed scheme performs very well in terms of energy saving and broadcast delays based on three different metrics, including average authentication delays, the percentage of nodes receiving fake messages, and the percentage of nodes forwarding fake messages.
引用
收藏
页数:30
相关论文
共 50 条
  • [31] Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks
    Panoat Chuchaisri
    Richard Newman
    Mobile Networks and Applications, 2012, 17 : 508 - 525
  • [32] A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
    Sultana, Salmin
    Ghinita, Gabriel
    Bertino, Elisa
    Shehab, Mohamed
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (03) : 256 - 269
  • [33] Certificateless broadcast authentication for vehicular ad hoc networks
    Ryu, Eun-Kyung
    Yoo, Kee-Young
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 602 - 611
  • [34] Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks
    Midi, Daniele
    Bertino, Elisa
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2016, 12 (02)
  • [35] BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) : 1545 - 1554
  • [36] εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
    Shim, Kyung-Ah
    Lee, Young-Ran
    Park, Cheol-Min
    AD HOC NETWORKS, 2013, 11 (01) : 182 - 189
  • [37] CRTBA: Chinese Remainder Theorem-Based Broadcast Authentication in Wireless Sensor Networks
    Zhang, Jianmin
    Yu, Wenqi
    Liu, Xiande
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 846 - +
  • [38] TWO ATTACKS ON A TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Shun-Der
    PARALLEL PROCESSING LETTERS, 2011, 21 (01) : 21 - 26
  • [39] Constrained Function-Based Message Authentication for Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) : 407 - 425
  • [40] Multirate Packet Delivery in Heterogeneous Broadcast Networks
    Zarrabian, Mohammad A.
    Tabataba, Foroogh S.
    Molavipour, Sina
    Sadeghi, Parastoo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (10) : 10134 - 10144