Back to Search
Start Over
Achieving robust message authentication in sensor networks: a public-key based approach
- Source :
- Wireless Networks. 16:999-1009
- Publication Year :
- 2009
- Publisher :
- Springer Science and Business Media LLC, 2009.
-
Abstract
- Given the extremely limited hardware resources on sensor nodes and the inclement deploying environment, the adversary Denial-of-Service (DoS) attack becomes a serious security threat toward wireless sensor networks. Without adequate defense mechanism, the adversary can simply inundate the network by flooding the bogus data packets, and paralyze the partial or whole sensor network by depleting node battery power. Prior work on false packet filtering in sensor networks are mostly based on symmetric key schemes, with the concern that the public key operations are too expensive for the resource constrained sensors. Recent progress in public key implementations on sensors, however, has shown that public key is already feasible for sensors. In this paper, we present PDF, a Public-key based false Data Filtering scheme that leverages Shamir's threshold cryptography and Elliptic Curve Cryptography (ECC), and effectively rejects 100% of false data packets. We evaluate PDF by real world implementation on MICAz motes. Our experiment results support the conclusion that PDF is practical for real world sensor deployment.
- Subjects :
- Authentication
Computer Networks and Communications
business.industry
Computer science
Network packet
Cryptography
Adversary
Computer security
computer.software_genre
Public-key cryptography
Key distribution in wireless sensor networks
Symmetric-key algorithm
Mobile wireless sensor network
Message authentication code
Electrical and Electronic Engineering
Elliptic curve cryptography
business
computer
Wireless sensor network
Information Systems
Computer network
Subjects
Details
- ISSN :
- 15728196 and 10220038
- Volume :
- 16
- Database :
- OpenAIRE
- Journal :
- Wireless Networks
- Accession number :
- edsair.doi...........1283e7361614c3ad7f482e3da3f6b086
- Full Text :
- https://doi.org/10.1007/s11276-009-0184-z