Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we provide an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion.
Original languageEnglish
Title of host publicationSecure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
PublisherSpringer
Publication date2013
Pages1-16
ISBN (Print)978-3-642-41487-9
ISBN (Electronic)978-3-642-41488-6
DOIs
Publication statusPublished - 2013
Event18th Nordic Conference on Secure IT Systems (NordSec 2013) - Ilulissat, Greenland
Duration: 18 Oct 201321 Oct 2013
http://nordsec2013.imm.dtu.dk/

Conference

Conference18th Nordic Conference on Secure IT Systems (NordSec 2013)
CountryGreenland
CityIlulissat
Period18/10/201321/10/2013
Internet address
SeriesLecture Notes in Computer Science
Volume8208
ISSN0302-9743

Keywords

  • Beacon Replay Attack
  • Receiver Initiated Medium Access Control
  • Wireless Sensor Network Security

Fingerprint Dive into the research topics of 'Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs'. Together they form a unique fingerprint.

Cite this