Cited 4 time in
Cited 2 time in
Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
- Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks
- Gope, P[Gope, Prosanta]; Lee, J[Lee, Jemin]; Quek, TQS[Quek, Tony Q. S.]
- DGIST Authors
- Lee, J[Lee, Jemin]
- Issue Date
- IEEE Sensors Journal, 17(2), 498-503
- Article Type
- Anonymity; Anonymous Authentication; Authentication; Authentication Scheme; Autonomous Instruments; Computer Crime; Critical Applications; Denial-of-Service Attack; Dos Attack; Gateways (Computer Networks); Secure Authentications; Sensor Nodes; User Authentication Protocols; Wireless Sensor Network (WSN); Wireless Sensor Networks (WSNs); WSN
- Wireless sensor networks (WSNs) include spatially allotted autonomous instruments that employ sensors to check environmental or physical conditions. These autonomous instruments or nodes blend with routers or gateway to make several WSN-based real-Time applications. In many critical applications, an external user can directly access the real-Time data from sensor node. In this context, before offering access, the legitimacy of the user is required to be verified through a secure authentication scheme. Since, in WSN-based real-Time applications, the privacy of the user is greatly important, the authentication scheme for such environment should be anonymous. Till now, impressive efforts have been made in designing lightweight anonymous authentication protocol for WSN-based real-Time applications. However, most of such protocols are vulnerable to DoS attacks, which are occurred due to the loss of synchronization between the participants. Furthermore, to rebuilt synchronization between the participants, a protocol may need to compromise un-link-Ability property. Therefore, it can be argued that the problem of DoS attack has not been addressed properly in the existing literatures. In this paper, we present a way to deal with DoS attacks in designing lightweight anonymous authentication protocol for WSN-based real-Time applications without compromising any anonymity support. We argue that our proposed solution can easily be incorporated with the existing schemes to be resilient to DoS attacks. © 2001-2012 IEEE.
- Institute of Electrical and Electronics Engineers Inc.
- Related Researcher
Lee, Je Min
ISC(Information Security and Communication) Lab
Wireless Communication System; Information Security
There are no files associated with this item.
- Information and Communication EngineeringETC1. Journal Articles
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.