A Multi-user DoS-containment Broadcast Authentication Scheme for Wireless Sensor Networks

被引:2
作者
Gan, Xian [1 ]
Li, Qiaoliang [1 ]
机构
[1] Hunan Univ, Sch Comp & Commun, Changsha 410082, Hunan, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS | 2009年
关键词
Wireless sensor networks; broadcast authentication;
D O I
10.1109/ITCS.2009.103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Broadcast authentication is an essential service in wireless sensor networks. There are two general approaches for broadcast authentication in wireless sensor networks: digital signatures and mu TESLA-based techniques. Digital signature is based on Public Key Cryptography (PKC). With the advance of technology, PKC will sooner or later be widely used in wireless sensor networks. However, signature-based broadcast authentication is vulnerable to Denial of Services (DoS) attacks: An attacker can inject bogus broadcast packets to force sensor nodes to perform expensive signature verifications, thus exhausts their limited battery power and delays their response to authentic broadcast messages. This paper presents a multi-user, signature-based broadcast authentication scheme with the capability of containing such DoS attack. We address multi-user supporting problem with Bloom Filter. We propose RRAS (Reputation-based Randomized Authentication Scheme) to contain the DoS attack. RRAS employs reputation management and risk management to decide whether to authenticate a message or not. Extensive evaluations in glomosim demonstrate that RRAS can effectively confine the DoS attack to a small range of the network. The communication, computation and storage overhead are minimized and affordable for sensor nodes.
引用
收藏
页码:472 / 475
页数:4
相关论文
共 9 条
  • [1] [Anonymous], WMCS200711 COLL WILL
  • [2] [Anonymous], 2004, P 6 INT WORKSH CRYPT
  • [3] HUANG Y, 2008, COMP COMP COMM WORKS, P1
  • [4] Liu An., 2011, TINYECC ELLIPTIC CUR
  • [5] Liu D., 2004, ACM Trans. Embed. Comput. Syst., V3, P800, DOI DOI 10.1145/1027794.1027800
  • [6] Liu DG, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P118
  • [7] SPINS: Security protocols for sensor networks
    Perrig, A
    Szewczyk, R
    Tygar, JD
    Wen, V
    Culler, DE
    [J]. WIRELESS NETWORKS, 2002, 8 (05) : 521 - 534
  • [8] Multi-user broadcast authentication in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    [J]. 2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 223 - +
  • [9] Wang RH, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P71