Robust data authentication for unattended wireless sensor networks

被引:4
作者
Dahshan, Mostafa H. [1 ]
机构
[1] King Saud Univ, Dept Comp Engn, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Unattended wireless sensor networks; Security; Authentication;
D O I
10.1007/s11235-017-0281-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.
引用
收藏
页码:181 / 196
页数:16
相关论文
共 23 条
  • [1] [Anonymous], J INFORM HIDING MULT
  • [2] Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare
    Babamir, Faezeh Sadat
    Norouzi, Ali
    [J]. COMPUTER JOURNAL, 2014, 57 (04) : 624 - 635
  • [3] Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption
    Babamir, Faezeh Sadat
    Eslami, Ziba
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (11): : 2940 - 2955
  • [4] Bohli JM, 2011, C LOCAL COMPUT NETW, P994, DOI 10.1109/LCN.2011.6114411
  • [5] Chang F.C., 2016, J NETW INTELL, V1, P1
  • [6] Secure Data Distribution Scheme with Two-Hop Survival Strategy for Unattended WSNs
    Cheng, Wei
    Li, Yong
    Jiang, Yi
    Yin, Xipeng
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [7] POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
    Di Pietro, Roberto
    Ma, Di
    Soriente, Claudio
    Tsudik, Gene
    [J]. PROCEEDINGS OF THE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, 2008, : 185 - 194
  • [8] Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
    Elsafrawey, Amir S.
    Hassan, Emad S.
    Dessouky, Moawad I.
    [J]. IET INFORMATION SECURITY, 2015, 9 (04) : 223 - 233
  • [9] WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings
    Ghayvat, Hemant
    Mukhopadhyay, Subhas
    Gui, Xiang
    Suryadevara, Nagender
    [J]. SENSORS, 2015, 15 (05): : 10350 - 10379
  • [10] Jing W., 2005, 27 CHIN CONTR DEC C, P5981, DOI [10.1109/CCDC.2015.7161882, DOI 10.1109/CCDC.2015.7161882]