Title :
On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs
Author :
Victor Cionca;Thomas Newe;Vasile Dadarlat
Author_Institution :
Electronic and Computer Engineering, University of Limerick, Ireland
Abstract :
The cryptographic operations used in security protocols like data security and authentication will always impose a certain overhead on the amount of time required to process received data. Cautious balance must be maintained between the amount of security required in an application and its overhead. Starting from the random jamming/MAC flooding Denial of Service attacks we examine the possibility of mounting an attack that exploits the overhead required to authenticate received packets. The tests show a resilient protocol and a vulnerable one.
Keywords :
"Computer crime","Wireless sensor networks","Data security","Message authentication","Cryptographic protocols","Public key","Elliptic curve cryptography","Public key cryptography","Jamming","Testing"
Conference_Titel :
Sensors Applications Symposium, 2009. SAS 2009. IEEE
Print_ISBN :
978-1-4244-2786-4
DOI :
10.1109/SAS.2009.4801781