Abstract
In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we provide an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion.
Original language | English |
---|---|
Title of host publication | Secure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings |
Publisher | Springer |
Publication date | 2013 |
Pages | 1-16 |
ISBN (Print) | 978-3-642-41487-9 |
ISBN (Electronic) | 978-3-642-41488-6 |
DOIs | |
Publication status | Published - 2013 |
Event | 18th Nordic Conference on Secure IT Systems (NordSec 2013) - Ilulissat, Greenland Duration: 18 Oct 2013 → 21 Oct 2013 http://nordsec2013.imm.dtu.dk/ |
Conference
Conference | 18th Nordic Conference on Secure IT Systems (NordSec 2013) |
---|---|
Country/Territory | Greenland |
City | Ilulissat |
Period | 18/10/2013 → 21/10/2013 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 8208 |
ISSN | 0302-9743 |
Keywords
- Beacon Replay Attack
- Receiver Initiated Medium Access Control
- Wireless Sensor Network Security