On the (im)possibility of Denial of Service attacks exploiting authentication overhead in wsns

Victor Cionca, Thomas Newe, Vasile Dǎdârlat

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The cryptographic operations used in security protocols like data security and authentication will always impose a certain overhead on the amount of time required to process received data. Cautious balance must be maintained between the amount of security required in an application and its overhead. Starting from the random jamming/MAC flooding Denial of Service attacks we examine the possibility of mounting an attack that exploits the overhead required to authenticate received packets. The tests show a resilient protocol and a vulnerable one.

Original languageEnglish
Title of host publicationSAS 2009 - IEEE Sensors Applications Symposium Proceedings
Pages74-79
Number of pages6
DOIs
Publication statusPublished - 2009
EventIEEE Sensors Applications Symposium, SAS 2009 - New Orleans, LA, United States
Duration: 17 Feb 200919 Feb 2009

Publication series

NameSAS 2009 - IEEE Sensors Applications Symposium Proceedings

Conference

ConferenceIEEE Sensors Applications Symposium, SAS 2009
Country/TerritoryUnited States
CityNew Orleans, LA
Period17/02/0919/02/09

Fingerprint

Dive into the research topics of 'On the (im)possibility of Denial of Service attacks exploiting authentication overhead in wsns'. Together they form a unique fingerprint.

Cite this