Providing security using Signature-Based Broadcast Authentication in Sensor Networks
As per recent studies it is feasible to perform public key cryptographic operations on resource-constrained sensor platforms. But the problem is energy consumption introduced by public key operations makes any public key-based protocol an easy target of Denial-of-Service attacks. For example, if digital signature schemes like Elliptic Curve Digital Signature Algorithm are used directly for broadcast authentication without further protection, an attacker can simply broadcast fake messages and force the receiving nodes to perform a huge number of unnecessary signature verifications, and can consume their battery power. This paper shows how to mitigate such Denial-of-Service attacks when digital signatures are used for broadcast authentication in sensor networks. Specifically, this paper first presents two filtering techniques, the group-based filter and the key chain-based filter, to handle the Denial-of-Service attacks against signature verification. Both methods can reduce the number of unnecessary signature verifications when a sensor node is under Denial-of-Service attack. This paper then combines these two filters and proposes a hybrid solution to further improve the performance.
Keywords: Sensor networks, security, broadcast authentication, Denial-of-Service attacks, digital signature.
AKYILDIZ, I., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIRCI, E. 2002. Wireless sensor networks: A survey. Computer Networks 38, 4, 393–422.
BLUNDO, C., DE SANTIS, A., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectly-secure key
distribution for dynamic conferences. In Advances in Cryptology – CRYPTO ’92, LNCS 740. 471–486. CHAN, H., PERRIG, A., AND SONG, D. 2003. Random key predistribution schemes for sensor networks.
In Proceedings of the IEEE Symposium on Security and Privacy (S&P). 197–213.
CROSSBOW TECHNOLOGY INC. 2008. MICAz 2.4GHz Wireless Module. http://www.xbow.com/Products/ productdetails.aspx?sid=164. Accessed in January 2008.
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/