SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
A DoS-resilient en-route filtering scheme for sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Hi-index | 0.00 |
This paper presents a Constrained Function based message Authentication (CFA) scheme for wireless sensor networks, which meets all the requirements of the so-called sensor authentication criteria, while most of the existing schemes only achieve partial requirements. In particular, to the best of our knowledge, CFA is the first authentication scheme supporting enroute filtering with only a single packet overhead. We examine the CFA scheme from both the theoretical and experimental aspects. Our method has also been practically implemented on the TelosB compatible mote for performance evaluation.