TY - JOUR
T1 - A new ADV-hash approach supporting secure and DoS-resistant network reprogramming in wireless sensor networks(WSNs)
AU - Zhang, Yu
AU - Jiang, Zejun
AU - Zhou, Xingshe
AU - Fang, Zhiyi
AU - Wang, Lifang
PY - 2009/12
Y1 - 2009/12
N2 - Aim: Existing secure network reprogramming protocols are, in our opinion, deficient in that attackers can exploit the Deluge epidemic and suppression mechanism to launch denial of service (DoS) attacks. We propose a new ADV-Hash approach which we believe is without this deficiency. Section 1 of the full paper classifies the DoS attacks - caused by bogus advertisements - into three types. The core idea of section 2 consists of: (1) the ADV-Hash approach maps all the advertisements of coded updates onto a limited sequence of messages; (2) it employs the public key cryptography to sign the root of an ADV-Hash chain for once only so that the nodes of WSNs can achieve the lightweight authentication of control message. The TOSSIM simulation results, given in Figs. 5 through 7, and their analysis show preliminarily that our new ADV-Hash approach can effectively avoid the attacks caused by bogus advertisements without affecting the epidemic nature of the Deluge protocol, thus providing network reprogramming protocols with service availability.
AB - Aim: Existing secure network reprogramming protocols are, in our opinion, deficient in that attackers can exploit the Deluge epidemic and suppression mechanism to launch denial of service (DoS) attacks. We propose a new ADV-Hash approach which we believe is without this deficiency. Section 1 of the full paper classifies the DoS attacks - caused by bogus advertisements - into three types. The core idea of section 2 consists of: (1) the ADV-Hash approach maps all the advertisements of coded updates onto a limited sequence of messages; (2) it employs the public key cryptography to sign the root of an ADV-Hash chain for once only so that the nodes of WSNs can achieve the lightweight authentication of control message. The TOSSIM simulation results, given in Figs. 5 through 7, and their analysis show preliminarily that our new ADV-Hash approach can effectively avoid the attacks caused by bogus advertisements without affecting the epidemic nature of the Deluge protocol, thus providing network reprogramming protocols with service availability.
KW - ADV-Hash chain
KW - Deluge protocol
KW - Denial of service (DoS) attack
KW - Network reprogramming protocol
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=74849132436&partnerID=8YFLogxK
M3 - 文章
AN - SCOPUS:74849132436
SN - 1000-2758
VL - 27
SP - 873
EP - 878
JO - Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University
JF - Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University
IS - 6
ER -