DocumentCode :
651634
Title :
A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks
Author :
Tanabe, Nari ; Kohno, Eitaro ; Kakuda, Yoshiaki
Author_Institution :
Grad. Sch. of Inf. Sci., Hiroshima City Univ., Hiroshima, Japan
fYear :
2013
fDate :
8-11 July 2013
Firstpage :
357
Lastpage :
361
Abstract :
For Wireless Sensor Networks (WSNs), a secret sharing scheme-based secure dispersed data transfer method has been proposed. While this method has resilience against node capture attacks, it is susceptible to node impersonation. We have already proposed an effective method for detecting impersonation attacks on source nodes. However, impersonation attacks on relaying nodes remain a threat to WSNs. With secure dispersed data transfer, impersonation attacks can cause the concentration of dispersed (encrypted) data. This concentration can lead to acquisition of the original secret data even if a secret sharing scheme-based secure dispersed data transfer method is used for encryption. To counter impersonation attacks on a relaying node, we must detect which paths include the impersonated relaying node. When the dispersed data transfer method can authenticate whether the data packets´ paths are correct, a source node can perform confidential communications with its destination node even if malicious relaying nodes are present. Instead of the detection method for impersonation attacks on source nodes, a path-authenticating method must determine which paths are legitimate and which are impersonated. In this paper, we propose a new detection method for impersonation attacks by relaying nodes using Bloom filters to authenticate paths. We have implemented our proposed method on a simulator, QualNet. We have conducted simulation experiments to confirm the effectiveness of our proposed method.
Keywords :
cryptography; data structures; telecommunication security; wireless sensor networks; QualNet; WSN; bloom filters; confidential communications; destination node; dispersed data; encrypted data; impersonated relaying node; impersonation attacks; malicious relaying nodes; node capture attacks; node impersonation; path authenticating method; path-authenticating method; relaying nodes; secret sharing scheme-based secure dispersed data transfer method; secure dispersed data transfer; source nodes; wireless sensor networks; Authentication; Conferences; Cryptography; Data transfer; Routing; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd International Conference on
Conference_Location :
Philadelphia, PA
Print_ISBN :
978-1-4799-3247-4
Type :
conf
DOI :
10.1109/ICDCSW.2013.34
Filename :
6679914
Link To Document :
بازگشت