How to construct random functions
Journal of the ACM (JACM)
A new family of authentication protocols
ACM SIGOPS Operating Systems Review
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Digital Signatures for Flows and Multicasts
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
ANSWER: autonomous wireless sensor network
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
A secure alternate path routing in sensor networks
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
Computer Communications
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
A role-based access in a hierarchical sensor network architecture to provide multilevel security
Computer Communications
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
International Journal of Sensor Networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Security model and framework for information aggregation in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure multidimensional range queries in sensor networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
A constrained function based message authentication scheme for sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
Research on biological immunity principle based security model for wireless sensor network
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A symmetric key based secured data gathering protocol for WSN
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
An efficient broadcast encryption scheme for wireless sensor network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Provably secure framework for information aggregation in sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Verifiable fine-grained top-k queries in tiered sensor networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Denial of service attack-resistant flooding authentication in wireless sensor networks
Computer Communications
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Location privacy and resilience in wireless sensor networks querying
Computer Communications
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
On broadcast authentication in wireless sensor networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient message broadcast authentication scheme for sensor networks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
μTESLA-based secure routing protocol for wireless sensor networks
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Message and its origin authentication protocol for data aggregation in sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Secure Distributed Data Aggregation
Foundations and Trends in Databases
A framework of deployment strategy for hierarchical WSN security management
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Containing bogus packet insertion attacks for broadcast authentication in sensor networks
ACM Transactions on Sensor Networks (TOSN)
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Providing DoS resistance for signature-based broadcast authentication in sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Secure Broadcast with One-Time Signatures in Controller Area Networks
International Journal of Mobile Computing and Multimedia Communications
Hi-index | 0.00 |
Broadcast authentication is a fundamental security service in distributed sensor networks. This paper presents the development of a scalable broadcast authentication scheme named multilevel μTESLA based on μTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multilevel μTESLA satisfies several nice properties, including low overhead, tolerance of message loss, scalability to large networks, and resistance to replay attacks as well as denial-of-service attacks. This paper also presents the experimental results obtained through simulation, which demonstrate the performance of the proposed scheme under severe denial-of-service attacks and poor channel quality.