skip to main content
10.1145/1866307.1866417acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Dynamic window based multihop authentication for WSN

Published: 04 October 2010 Publication History

Abstract

Per-hop authentication is the most effective way to prevent DOS attacks during multihop data delivery. Although the study results show that Public Key Cryptography (PKC) is feasible on sensor nodes with limited resources, it is still very expensive to perform per-hop authentication using public key digital signature. To solve the problem that the resources of WSN is exhausted quickly by PKC, Dynamic Window Based Multihop Authentication(DWMA) for WSN is proposed in this paper. Dynamic window makes it possible to pay only a small number of authentication based on digital signature for confining DoS attacks effectively in a small scope and locating suspicious nodes quickly. Experimental results show that DWMA could save more resources than per-hop authentication for WSN, defend DoS attacks effectively and locate malicious nodes. It's an effective protocol for ensuring the resistance of DoS in routing.

References

[1]
]]Raymond D.R, Midkiff S.F."Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses". IEEE Pervasive Computing, vol.7, no.1, pp. 74--81, Jan.-March 2008.
[2]
]]Adrian Perrig, Robert Szewczyk,J. D. Tygar,Victor Wen,David E. Culler ."SPINS: Security Protocols for Sensor Networks". Wireless Networks, vol.8, no.5, pp.521--534, Sep 2002.
[3]
]]Luk M, Mezzour G Perrig A, Gligor V. "MiniSec: A Secure Sensor Network Communication Architecture". IPSN 2007, pp. 479--488, 25--27 April 2007.
[4]
]]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning. "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks". ACM Transactions on Sensor Networks, vol. 3, no. 3, pp.14/1--14/33, August 2007.
[5]
]]Kui Ren, Wenjing Lou, Yanchao Zhang. "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks". IEEE Transaction on mobile computing, vol. 7, no. 5, pp.585--598, May 2008.
[6]
]]Jing Deng, Richard Han, Shivakant Mishra. "Limiting DoS attacks during multihop data delivery in wireless sensor networks". International Journal of Security and Networks, vol.1, nos.3/4, pp.167--176, 2006.
[7]
]]Wander A.S, Gura N, Eberle H, Gupta V, Shantz S.C. "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks". PerCom 2005.Third IEEE International Conference, pp. 324 -- 328, 8--12 March 2005.
[8]
]]David J. Malan, Matt Welsh, Michael D. Smith. "Implementing public-key infrastructure for sensor networks". ACM Transactions on Sensor Networks, vol.4, no.4, pp.1--23, Aug.2008.
[9]
]]Ronghua Wang, Wenliang Du, Peng Ning ."Containing denial-of-service attacks in broadcast authentication in sensor networks". 8th ACM MobiCom, pp.71--79, Sep 2007.

Cited By

View all
  • (2014)Sensor authentication in collaborating sensor networks2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)10.1109/MedHocNet.2014.6849105(55-62)Online publication date: Jun-2014
  • (2013)Survey and comparison of message authentication solutions on wireless sensor networksAd Hoc Networks10.1016/j.adhoc.2012.08.01111:3(1221-1236)Online publication date: 1-May-2013
  • (2011)Comparison of Authenticated-Encryption schemes in Wireless Sensor NetworksProceedings of the 2011 IEEE 36th Conference on Local Computer Networks10.1109/LCN.2011.6115506(450-457)Online publication date: 4-Oct-2011

Index Terms

  1. Dynamic window based multihop authentication for WSN

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
    October 2010
    782 pages
    ISBN:9781450302456
    DOI:10.1145/1866307

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 October 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DoS
    2. dynamic window
    3. multihop authentication

    Qualifiers

    • Poster

    Conference

    CCS '10
    Sponsor:

    Acceptance Rates

    CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Sensor authentication in collaborating sensor networks2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET)10.1109/MedHocNet.2014.6849105(55-62)Online publication date: Jun-2014
    • (2013)Survey and comparison of message authentication solutions on wireless sensor networksAd Hoc Networks10.1016/j.adhoc.2012.08.01111:3(1221-1236)Online publication date: 1-May-2013
    • (2011)Comparison of Authenticated-Encryption schemes in Wireless Sensor NetworksProceedings of the 2011 IEEE 36th Conference on Local Computer Networks10.1109/LCN.2011.6115506(450-457)Online publication date: 4-Oct-2011

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media