In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we provide an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion. © 2013 Springer-Verlag.
CITATION STYLE
Di Mauro, A., Fafoutis, X., Mödersheim, S., & Dragoni, N. (2013). Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8208 LNCS, pp. 1–16). Springer Verlag. https://doi.org/10.1007/978-3-642-41488-6_1
Mendeley helps you to discover research relevant for your work.