SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Denial of Service in Sensor Networks
Computer
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
A secure conference scheme for mobile communications
IEEE Transactions on Wireless Communications
A conference key distribution system
IEEE Transactions on Information Theory
Conference key distribution schemes for secure digital mobile communications
IEEE Journal on Selected Areas in Communications
A secure mechanism of group communication for pervasive grid
International Journal of Ad Hoc and Ubiquitous Computing
Distributed KDC-based random pairwise key establishment in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Hi-index | 0.24 |
In this paper, a novel authentication protocol is proposed, which satisfies both security and reliability requirements for group communications in ad hoc networks. The security features include identity anonymity and location intracability, periodic one-way session key and pseudonym identity refreshment with implicit authentication, dynamic joining and leaving an in-progress communication session, and data encryption. The reliability features include efficient Denial of Service tolerance for broadcasting refreshment messages, fault-tolerance for recovering lost refreshment messages, robustness for resisting the clock skews among member nodes and seamless key switch without disrupting ongoing data transmissions. The performance and security analysis show that the communication and computation overhead of the proposed protocol is similar to the existing one, while the security can be enhanced significantly. The simulation results demonstrate the robustness of the proposed protocol under severe Denial of Service attack and poor wireless channel quality.