L. Gheorghe, R. Rughinis, Răzvan Deaconescu, N. Tapus
{"title":"无线传感器网络的认证和防重放安全协议","authors":"L. Gheorghe, R. Rughinis, Răzvan Deaconescu, N. Tapus","doi":"10.1109/ICSNC.2010.9","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks are used in domains such as medical monitoring, homeland security, industrial automation and military applications, therefore it is very critical to protect the network against malicious attacks. This paper presents a new security protocol that provides conversation authentication, integrity, intrusion prevention and anti-replay protection. The protocol uses two methods in order to meet these requirements: the last MAC method and an authentication handshake. The protocol has been implemented in TinyOS in two layers of the communication stack: the MAC and Authentication layer. The MAC layer is the implementation of the last MAC method and the Authentication layer generates and verifies the four messages exchanged during the authentication handshake. Authentication and Anti-replay Security Protocol has been tested with TOSSIM in various attack scenarios and has proved that it is able to reject malicious attempts to communicate with the network nodes.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"48 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Authentication and Anti-replay Security Protocol for Wireless Sensor Networks\",\"authors\":\"L. Gheorghe, R. Rughinis, Răzvan Deaconescu, N. Tapus\",\"doi\":\"10.1109/ICSNC.2010.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks are used in domains such as medical monitoring, homeland security, industrial automation and military applications, therefore it is very critical to protect the network against malicious attacks. This paper presents a new security protocol that provides conversation authentication, integrity, intrusion prevention and anti-replay protection. The protocol uses two methods in order to meet these requirements: the last MAC method and an authentication handshake. The protocol has been implemented in TinyOS in two layers of the communication stack: the MAC and Authentication layer. The MAC layer is the implementation of the last MAC method and the Authentication layer generates and verifies the four messages exchanged during the authentication handshake. Authentication and Anti-replay Security Protocol has been tested with TOSSIM in various attack scenarios and has proved that it is able to reject malicious attempts to communicate with the network nodes.\",\"PeriodicalId\":152012,\"journal\":{\"name\":\"2010 Fifth International Conference on Systems and Networks Communications\",\"volume\":\"48 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Fifth International Conference on Systems and Networks Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSNC.2010.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Fifth International Conference on Systems and Networks Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2010.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Authentication and Anti-replay Security Protocol for Wireless Sensor Networks
Wireless Sensor Networks are used in domains such as medical monitoring, homeland security, industrial automation and military applications, therefore it is very critical to protect the network against malicious attacks. This paper presents a new security protocol that provides conversation authentication, integrity, intrusion prevention and anti-replay protection. The protocol uses two methods in order to meet these requirements: the last MAC method and an authentication handshake. The protocol has been implemented in TinyOS in two layers of the communication stack: the MAC and Authentication layer. The MAC layer is the implementation of the last MAC method and the Authentication layer generates and verifies the four messages exchanged during the authentication handshake. Authentication and Anti-replay Security Protocol has been tested with TOSSIM in various attack scenarios and has proved that it is able to reject malicious attempts to communicate with the network nodes.