Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs

11Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we provide an analysis that highlights the trade-offs between the energy consumption and the level of security, defined as the resilience of the protocol to space exhaustion. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Di Mauro, A., Fafoutis, X., Mödersheim, S., & Dragoni, N. (2013). Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8208 LNCS, pp. 1–16). Springer Verlag. https://doi.org/10.1007/978-3-642-41488-6_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free