2011
DOI: 10.1109/tifs.2011.2106120
|View full text |Cite
|
Sign up to set email alerts
|

Constrained Function-Based Message Authentication for Sensor Networks

Abstract: Abstract-Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme, enabling each forwarding node to check the authenticity of the received message, acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function-based message Authentication (CFA) scheme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 61 publications
0
18
0
Order By: Relevance
“…There have been many authentication schemes proposed for wireless sensor networks [1]. But Constrained Function based Authentication (CFA) [13] is only scheme of authentication which is supporting en-route filtering with only single packet overhead.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…There have been many authentication schemes proposed for wireless sensor networks [1]. But Constrained Function based Authentication (CFA) [13] is only scheme of authentication which is supporting en-route filtering with only single packet overhead.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…We present a Virtual Counter Manager (VCM) with synchronized incremental counters and explore the KeyLock Matching (KLM) method [14] to, respectively, resist the replay/jamming attacks and achieve memory data access control. On the other hand, since sensors in the network, particularly those with limited resources, may suffer from DoS attacks, our previous work, called Constrained Functionbased Authentication (CFA) [28], is employed with proper modification to resist DoS attacks. We denote the process of executing CFA in the AES with Offset Codebook Mode (OCB) mode as AES-OCFA.…”
Section: Overview Of Our Methods and Contributionsmentioning
confidence: 99%
“…More specifically, included in AES-OCFA are two procedures for mitigating DoS and detecting replay/jamming attacks. Basically, in order to tackle DoS, our previously proposed method Constrained Function-based Authentication (CFA) scheme [28] has been properly modified and incorporated with the AES in OCB mode. Note that AES in OCB mode generates a ciphertext that simultaneously provides data secrecy and authenticity.…”
Section: Proposed Method: Motesec-awarementioning
confidence: 99%
“…However, relatively less research [6,[12][13][14][15] has focused on investigations of countermeasures to combat the latter type of security attack, which is called a false endorsement insertion attack (FEIA). Note that the detection of FEIAs might be much more important than that of FDIAs because of the important role of WSNs in reporting critical events.…”
Section: Introductionmentioning
confidence: 99%
“…Note that the detection of FEIAs might be much more important than that of FDIAs because of the important role of WSNs in reporting critical events. FEIA countermeasures can be classified into two types: distributed [6,[12][13][14] and centralized [15]. The centralized solution proposed by Lee and Cho [15], which is called the adaptive countering scheme (ACS), is more energy-efficient during "peacetime" (i.e., when an FEIA does not occur) because it does not involve en-route verification processes for reports.…”
Section: Introductionmentioning
confidence: 99%