DocumentCode :
496133
Title :
A Multi-user DoS-Containment Broadcast Authentication Scheme for Wireless Sensor Networks
Author :
Gan, Xian ; Li, Qiaoliang
Author_Institution :
Sch. of Comput. & Commun., Hunan Univ., Changsha, China
Volume :
1
fYear :
2009
fDate :
25-26 July 2009
Firstpage :
472
Lastpage :
475
Abstract :
Broadcast authentication is an essential service in wireless sensor networks. There are two general approaches for broadcast authentication in wireless sensor networks: digital signatures and muTESLA-based techniques. Digital signature is based on public key cryptography (PKC). With the advance of technology, PKC will sooner or later be widely used in wireless sensor networks. However, signature-based broadcast authentication is vulnerable to denial of services (DoS) attacks: an attacker can inject bogus broadcast packets to force sensor nodes to perform expensive signature verifications, thus exhausts their limited battery power and delays their response to authentic broadcast messages. This paper presents a multi-user, signature-based broadcast authentication scheme with the capability of containing such DoS attack. We address multi-user supporting problem with bloom filter. We propose RRAS (reputation-based randomized authentication scheme) to contain the DoS attack. RRAS employs reputation management and risk management to decide whether to authenticate a message or not. Extensive evaluations in glomosim demonstrate that RRAS can effectively confine the DoS attack to a small range of the network. The communication, computation and storage overhead are minimized and affordable for sensor nodes.
Keywords :
digital signatures; public key cryptography; risk management; telecommunication services; wireless sensor networks; PKC; RRAS; bloom filter; broadcast authentication; denial of services; digital signatures; multiuser DoS; public key cryptography; reputation management; reputation-based randomized authentication scheme; risk management; wireless sensor networks; Authentication; Batteries; Broadcasting; Computer crime; Digital signatures; Force sensors; Handwriting recognition; Public key cryptography; Risk management; Wireless sensor networks; Wireless sensor networks; broadcast authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology and Computer Science, 2009. ITCS 2009. International Conference on
Conference_Location :
Kiev
Print_ISBN :
978-0-7695-3688-0
Type :
conf
DOI :
10.1109/ITCS.2009.103
Filename :
5190114
Link To Document :
بازگشت