180 likes | 398 Views
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. Author : Na Ruan , Yoshiaki Hori Published in: 2012 International Conference on Selected Topics in Mobile and Wireless Networking Presented : 102064506 劉立恆. O utline. Introduction
E N D
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things Author: Na Ruan, Yoshiaki Hori Published in: 2012 International Conference on Selected Topics in Mobile and Wireless Networking Presented: 102064506 劉立恆
Outline Introduction WSN, VANET DOS TESLA protocol Original TESLA TESLA++ µTESLA Reviseprotocol Performance analysis
WSN(Wireless Sensor Network) • Limitation of memory • Limitation of computation power • Limitation of power consumption
Revised Protocol • Resisting of both computational and memory-based DoS attack. • Low complexity
DOS • Memory based • Computation based
TESLA (Timed Efficient Stream Loss-tolerant Authentication) Hash function f(Ki, M)
TESLA++ 查表
µTESLA • All packets sent within one time interval are authenticated with the same key. • Disclosed delay • ex: 2 time intervals • F(Ki)=Ki-1
Revised protocol • Store MAC instead of Message(same as TESLA++) • Two-level key chain
Comparison • Tolerate bothcomputational and memory-based DoS attack with low energyconsumption
Performance • Left • Relationship between Ba and Bd for P=0.9 • Right • Relationship between Ba and m for P=0.9
Drawback • Computational DoS free ? • Lack of experiments • Abetter algorithm ?