Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks

被引:0
|
作者
Xiong, Kaiqi [1 ]
Wang, Ronghua [2 ]
Du, Wenliang [3 ]
Ning, Peng [4 ]
机构
[1] Rochester Inst Technol, Coll Comp & Informat Sci, Rochester, NY 14623 USA
[2] Microsoft Corp, Richmond, WA 98052 USA
[3] Syracuse Univ, Dept Elect & Engn & Comp Sci, Syracuse, NY 13210 USA
[4] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Security; Design; Algorithms; Broadcast authentication; bogus packet insertion attack; AIMD; sensor networks; energy consumption; broadcast delay; SERVICE;
D O I
10.1145/2240092.2240094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast is a critical communication primitive in wireless sensor networks. The multihop nature of sensor networks makes it necessary for sensor nodes to forward broadcast messages so that the messages can reach an entire network. Authentication of broadcast messages is an important but challenging problem in sensor networks. Public key cryptography (PKC) has been used recently to address this problem. However, PKC-based authentication techniques are susceptible to bogus packet insertion attacks in which attackers keep broadcasting bogus messages and force resource-constrained sensor nodes to forward such messages. Moreover, because it takes time to do signature verifications, it is impractical for each node to authenticate every received message before forwarding it. In this article, we propose a dynamic window scheme to thwart the aforementioned bogus packet insertion attacks which permits sensor nodes to efficiently broadcast messages. Within this scheme, a sensor node has the ability to determine whether or not to verify an incoming message before forwarding the message. We further study the property of this dynamic window scheme and investigate the best strategy for thwarting bogus packet insertion attacks. We propose three strategies for finding the optimal parameters by an improved additive increase multiplicative decrease (AIMD) window updating function so that the proposed dynamic window scheme can achieve the best overall performance with respect to the authentication and forwarding times of messages. Numerical validations show that our proposed scheme performs very well in terms of energy saving and broadcast delays based on three different metrics, including average authentication delays, the percentage of nodes receiving fake messages, and the percentage of nodes forwarding fake messages.
引用
收藏
页数:30
相关论文
共 50 条
  • [41] Distributed authentication of program integrity verification in wireless sensor networks
    Chang, Katharine
    Shin, Kang G.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)
  • [42] A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks
    Feng, Meng
    Lai, Chin-Feng
    Liu, Hong
    Qi, Rongxin
    Shen, Jian
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1303 - 1311
  • [43] A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks
    Gan, Xian
    Li, Qiaoliang
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 472 - 475
  • [44] IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    Cao, Xuefei
    Kou, Weidong
    Dang, Lanjun
    Zhao, Bin
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 659 - 667
  • [45] AN ID-BASED MULTIPLE AUTHENTICATION SCHEME AGAINST ATTACKS IN WIRELESS SENSOR NETWORKS
    Peng, Siwei
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1042 - 1045
  • [46] A practical inter-sensor broadcast authentication scheme
    Kim, Joon Wan
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    UNIVERSAL ACCESS IN HUMAN COMPUTER INTERACTION: COPING WITH DIVERSITY, PT 1, 2007, 4554 : 399 - +
  • [47] LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks
    Groza, Bogdan
    Murvay, Stefan
    Van Herrewege, Anthony
    Verbauwhede, Ingrid
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
  • [48] Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks
    Chien, Hung-Yu
    Lee, Chin-I
    Wu, Tzong-Chen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 993 - 998
  • [49] A secure broadcasting scheme to provide availability, reliability and authentication for wireless sensor networks
    Ayday, E.
    Fekri, F.
    AD HOC NETWORKS, 2012, 10 (07) : 1278 - 1290
  • [50] On the performance of probabilistic packet marking for traceback in sensor networks
    Yang, Feng
    Zhou, Xuehai
    Zhang, Qjyuan
    Xie, Jing
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 682 - 686