TY - JOUR
T1 - Robust data authentication for unattended wireless sensor networks
AU - Dahshan, Mostafa H.
N1 - Includes bibliographical references.
PY - 2017/10/1
Y1 - 2017/10/1
N2 - This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.
AB - This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.
KW - Authentication
KW - Security
KW - Unattended wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=85011298812&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85011298812&partnerID=8YFLogxK
U2 - 10.1007/s11235-017-0281-8
DO - 10.1007/s11235-017-0281-8
M3 - Article
AN - SCOPUS:85011298812
SN - 1018-4864
VL - 66
SP - 181
EP - 196
JO - Telecommunication Systems
JF - Telecommunication Systems
IS - 2
ER -