Denial of service attack-resistant flooding authentication in wireless sensor networks

  • Authors:
  • Ju-Hyung Son;Haiyun Luo;Seung-Woo Seo

  • Affiliations:
  • School of Electrical Engineering and Computer Science, Seoul National University, Seoul 151-744, Republic of Korea;Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL 61801-2302, USA;School of Electrical Engineering and Computer Science, Seoul National University, Seoul 151-744, Republic of Korea

  • Venue:
  • Computer Communications
  • Year:
  • 2010

Quantified Score

Hi-index 0.24

Visualization

Abstract

To achieve scalable and efficient broadcast authentication in large-scale networks, two asymmetry mechanisms have often been employed: the cryptographic asymmetry and the time asymmetry. Authentication schemes using digital signatures are based on the cryptographic asymmetry, while TESLA and related protocols using hash chains and delayed-key release methods are based on the time asymmetry. However, the former is computationally expensive while the latter provides delayed authentication only. Therefore, they are vulnerable to denial of service attacks that repeatedly request signature verifications with false messages. In this paper, we propose a novel broadcast authentication mechanism based on our ''Information Asymmetry'' model. It leverages an asymmetric distribution of keys between a sink and sensor nodes and uses the Bloom filter as an authenticator, which efficiently compresses multiple authentication information. In addition, with a novel ''false negative'' tuning knob introduced in construction of the Bloom filter, we show that scalability of our authentication method can greatly be improved. Through an intensive analysis, we demonstrate optimized trade-off relationships between resiliency against compromised nodes and scalability of system size. Optimization results indicate that the proposed authentication scheme achieves low false positive rates with small signature verification costs.