TY - GEN
T1 - On the (im)possibility of Denial of Service attacks exploiting authentication overhead in wsns
AU - Cionca, Victor
AU - Newe, Thomas
AU - Dǎdârlat, Vasile
PY - 2009
Y1 - 2009
N2 - The cryptographic operations used in security protocols like data security and authentication will always impose a certain overhead on the amount of time required to process received data. Cautious balance must be maintained between the amount of security required in an application and its overhead. Starting from the random jamming/MAC flooding Denial of Service attacks we examine the possibility of mounting an attack that exploits the overhead required to authenticate received packets. The tests show a resilient protocol and a vulnerable one.
AB - The cryptographic operations used in security protocols like data security and authentication will always impose a certain overhead on the amount of time required to process received data. Cautious balance must be maintained between the amount of security required in an application and its overhead. Starting from the random jamming/MAC flooding Denial of Service attacks we examine the possibility of mounting an attack that exploits the overhead required to authenticate received packets. The tests show a resilient protocol and a vulnerable one.
UR - http://www.scopus.com/inward/record.url?scp=65249121937&partnerID=8YFLogxK
U2 - 10.1109/SAS.2009.4801781
DO - 10.1109/SAS.2009.4801781
M3 - Conference contribution
AN - SCOPUS:65249121937
SN - 9781424427871
T3 - SAS 2009 - IEEE Sensors Applications Symposium Proceedings
SP - 74
EP - 79
BT - SAS 2009 - IEEE Sensors Applications Symposium Proceedings
T2 - IEEE Sensors Applications Symposium, SAS 2009
Y2 - 17 February 2009 through 19 February 2009
ER -