HBSAP : A Hop-by-Hop Broadcast Source Authentication Protocol for WSN to mitigate DoS Attacks

نویسندگان

  • Chakib BEKARA
  • Kheira BEKARA
چکیده

Broadcast communication is a dominant communication pattern in WSN. As a major security concern, the broadcast source authentication is needed to mitigate impersonation of a broadcast source, modifications of its broadcasted data, or depletion of the limited energy of sensors caused by an attacker injecting useless broadcast traffic. Several Broadcast Source Authentication Protocols (BSAPs) were proposed in the literature. One class of them is time asymmetry-based BSAPs like μTESLA [1] protocol. These BSAPs operate delayed key-disclosure to secure broadcast communications, but they suffer from a kind of DoS attack, called resource-draining attack, in which an attacker floods the network with fake messages that all sensors of the network buffer and forward, then later verify, thus causing buffer overflow and batteries depletion. In this paper we propose the H2BSAP protocol, to overcome this kind of DoS attacks, by achieving a hop-by-hop authentication of broadcasted messages, thus limiting the damage of an attacker to its one-hop neighbors only, instead of the entire network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Providing Security for Multipath Routing Protocol in Wireless Sensor Networks

Wireless Sensor Network (WSN) is a combined group of sensors form a network. WSN will monitor the changes in physical conditions and it will forward the data via multi hop network. Sensors are dynamic in nature so the lifetime of sensors and providing security for the data transmitted by the nodes are the major problems faced by the Wireless Sensor Networks (WSN). Ad hoc On-demand Multipath Dis...

متن کامل

A Secure On-Demand Routing with Distributed Authentication for Trust-Based Ad Hoc Networks

Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol wi...

متن کامل

A Signaling Architecture for Network Traffic Authorization to Prevent form DoS Attacks

We present a signaling architecture for network traffic authorization, Permissionbased Sending (PBS). This architecture aims to prevent Denial-of-Service (DoS) attacks and other forms of unauthorized traffic. Towards this goal, PBS takes a hybrid approach: a proactive approach of explicit permissions and a reactive approach of monitoring and countering attacks. On-path signaling is used to conf...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

Slander Resistant Attacker Isolation in Ad Hoc Networks

This paper focuses on how to isolate attackers that inject packets to cause denial-of-service (DoS) effects in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defense goals, although they allow forwarding nodes to effectively identify and discard injected or modified packets. The other important defense goal, which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008