TY - GEN
T1 - A packet authentication scheme for wireless sensor networks
AU - Akbani, R.
AU - Korkmaz, T.
AU - Raju, G. V.S.
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - Securing Wireless Sensor Networks (WSNs) against attacks is crucial in order to deploy them across a broad range of applications. It is easy for adversaries to launch sophisticated attacks against them such as wormhole, man-in-the-middle and Denial of Service (DoS), or to impersonate other sensors and send false information. We present a new packet authentication scheme that defends against attacks from unauthorized nodes external to the WSN. We also provide a framework for dynamically excluding any internal nodes that are found to be compromised. We do this by authenticating every packet at every hop using an efficient two key based system, and dropping any unauthentic packets. We evaluated the performance of our scheme and compared it with other schemes using simulations. Our scheme is found to be very efficient in terms of memory, CPU power, latency and bandwidth making it suitable for use in resource constrained wireless sensors.
AB - Securing Wireless Sensor Networks (WSNs) against attacks is crucial in order to deploy them across a broad range of applications. It is easy for adversaries to launch sophisticated attacks against them such as wormhole, man-in-the-middle and Denial of Service (DoS), or to impersonate other sensors and send false information. We present a new packet authentication scheme that defends against attacks from unauthorized nodes external to the WSN. We also provide a framework for dynamically excluding any internal nodes that are found to be compromised. We do this by authenticating every packet at every hop using an efficient two key based system, and dropping any unauthentic packets. We evaluated the performance of our scheme and compared it with other schemes using simulations. Our scheme is found to be very efficient in terms of memory, CPU power, latency and bandwidth making it suitable for use in resource constrained wireless sensors.
UR - http://www.scopus.com/inward/record.url?scp=84883342536&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883342536&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84883342536
SN - 9781604237559
T3 - 22nd International Conference on Computers and Their Applications 2007, CATA 2007
SP - 401
EP - 407
BT - 22nd International Conference on Computers and Their Applications 2007, CATA 2007
T2 - 22nd International Conference on Computers and Their Applications 2007, CATA 2007
Y2 - 28 March 2007 through 30 March 2007
ER -