Cart (Loading....) | Create Account
Close category search window
 

Broadcast Authentication Protocol Scheme Based on DBP-MSP and Safe Routing in WSN against DDoS Attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Jiawei Chen ; Electron. Sci. & Eng. Dept., Nanjing Univ., Nanjing, China

In order to help the WSN achieve better performance against DDoS attacks in broadcast authentication, a new strategy based on DBP-MSP and safe routing is proposed in this paper. By introducing puzzle difficulty level k decided by the base station in DBP-MSP, the strategy can properly cut down computational consumption of the sender for solving a puzzle especially when the broadcast workload in WSN is not heavy, which properly controls the energy consumption of the sender. By introducing the broadcast state table which is updated by the base station according to messages from nodes, the receiver can verify the puzzle solution by the message the base station returns by searching the table. DDoS attacks to broadcast authentication protocol can be prevented by this kind of weak authenticator. In addition, by introducing a key chain distribution scheme where the base station passes the one way key chains to the sender every time intervals, the storage and computation burden on the sender can be reduced, as well as better security performance for the one-way key chain. The simulation indicates that the new strategy can solve the limitation that a powerful sender with large memory resource is required in the basic MSP strategy, as well as achieving better performance in dealing with DDoS attacks. Hence, Our strategy is more secure and has wider applicable area in the WSN than the basic MSP strategy.

Published in:

Networking and Distributed Computing (ICNDC), 2011 Second International Conference on

Date of Conference:

21-24 Sept. 2011

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.