DocumentCode :
3630982
Title :
On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs
Author :
Victor Cionca;Thomas Newe;Vasile Dadarlat
Author_Institution :
Electronic and Computer Engineering, University of Limerick, Ireland
fYear :
2009
Firstpage :
74
Lastpage :
79
Abstract :
The cryptographic operations used in security protocols like data security and authentication will always impose a certain overhead on the amount of time required to process received data. Cautious balance must be maintained between the amount of security required in an application and its overhead. Starting from the random jamming/MAC flooding Denial of Service attacks we examine the possibility of mounting an attack that exploits the overhead required to authenticate received packets. The tests show a resilient protocol and a vulnerable one.
Keywords :
"Computer crime","Wireless sensor networks","Data security","Message authentication","Cryptographic protocols","Public key","Elliptic curve cryptography","Public key cryptography","Jamming","Testing"
Publisher :
ieee
Conference_Titel :
Sensors Applications Symposium, 2009. SAS 2009. IEEE
Print_ISBN :
978-1-4244-2786-4
Type :
conf
DOI :
10.1109/SAS.2009.4801781
Filename :
4801781
Link To Document :
بازگشت