Authentication masking code against DoS of T-MAC protocol

Young-ho Son , Jin-keun Hong , Keun-sung Bae

Journal of Central South University ›› 2013, Vol. 20 ›› Issue (7) : 1889 -1895.

PDF
Journal of Central South University ›› 2013, Vol. 20 ›› Issue (7) : 1889 -1895. DOI: 10.1007/s11771-013-1687-4
Article

Authentication masking code against DoS of T-MAC protocol

Author information +
History +
PDF

Abstract

Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.

Keywords

time out-medium access control (T-MAC) / security vulnerability / authentication / synchronization / authentication masking code

Cite this article

Download citation ▾
Young-ho Son, Jin-keun Hong, Keun-sung Bae. Authentication masking code against DoS of T-MAC protocol. Journal of Central South University, 2013, 20(7): 1889-1895 DOI:10.1007/s11771-013-1687-4

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

HuangP, XiaoL, SottaniS, MutkaM, XiN. The evolution of MAC protocols in wireless sensor networks: A survey [J]. IEEE Communications Surveys & Tutorials, 2012, 99: 1-20

[2]

BachirA, DohlerM, WatteyneT, LeungK K. MAC essentials for wireless sensor networks [J]. IEEE Communications Surveys & Tutorials, 2010, 12(2): 222-248

[3]

HuJ, MaZ, SunC-sheng. Energy-efficient MAC protocol designed for wireless sensor network for iot [C]. 7th International Conference on Computational Intelligence and Security. Haikou, China, 2011721-725

[4]

YeW, HeidemannJ, EstrinD. An energy-efficient MAC protocol for wireless sensor networks [C]. Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies. New York, USA, 20021567-1576

[5]

DamT V, LangendoenK. An adaptive energy-efficient MAC protocol for wireless sensor networks [C]. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles, USA, 2003171-180

[6]

ZhouY-l, LiuW-j, HuangB-x, LiuA-li. A duty cycle adaptive algorithm based on throughput [C]. International Conference on Information Technology and Computer Science. Kiev, 200939-42

[7]

LeeW, NguyenM, VermaA, LeeH. Schedule unifying algorithm extending network lifetime in S-MAC-based wireless sensor networks [J]. IEEE Transactions on Wireless Communications, 2009, 8(9): 4375-4379

[8]

XingG, KluesK, LuC. Towards unified radio power management for wireless sensor networks [J]. Journal of Wireless Communications & Mobile Computing, 2009, 9(3): 313-323

[9]

ItohT, ZhangY, MatsumotoM, MaedaR. Wireless sensor network for power consumption reduction in information and communication systems [C]. Proceedings of 8th Annual IEEE Conference on Sensors. Christchurch, 2009572-575

[10]

ArulmozhiK, DhulipalaV R S, PrabakaranR. A study on optimized power consumption routing in wireless sensor networks [C]. Proceeding of the 3rd International Conference on Electronics Computer Technology. Kanyakumari, 2011271-274

[11]

ManivannanD, VijayalakshmiB, NeelamegamP. An efficient authentication protocol based on congruence for wireless sensor networks [C]. Proceeding of International Conference on Recent Trends in Information Technology. Chennai, Tamil Nedu, 2011549-554

[12]

WangH. A robust mechanism for wireless sensor network security [C]. Proceeding of the 4th International Conference on Wireless Communication. Networking and Mobile Computing. Dalian, China, 20081-4

[13]

LuX, SpearM, LevittK, WuS F. A synchronization attack and defense in energy-efficient listen-sleep slotted MAC protocols [C]. Proceeding of 2nd International Conference on Emerging Security Information. System and Technologies. Cap esterel, 2008403-411

[14]

FengZ, NingJ-x, BroustisI. Copying with packet replay attacks in wireless networks [C]. Proceeding of the 8th Annual IEEE Communications Society Conference on Sensor. Mesh, and Ad Hoc Communications and Networks. Salt Lake City, USA, 2011368-376

[15]

RaymondD R, MarchanyR C, BrownfieldM I, MidkiffS F. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols [J]. IEEE Transaction on Vehicular Technology, 2009, 58(1): 367-380

[16]

SolomonWGOLOMB. Digital communication with space application [M], 1964California, USAPrentice-Hall Press48-53

[17]

NoJ, ChungH, YunM. Binary pseudorandom sequences of period 2m-1 with ideal autocorrelation generated by the polynomial Zd+(Z+1)d [J]. IEEE Transactions on Information Theory, 1998, 44(3): 1278-1282

AI Summary AI Mindmap
PDF

100

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/