Abstract
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.
Similar content being viewed by others
References
HUANG P, XIAO L, SOTTANI S, MUTKA M, XI N. The evolution of MAC protocols in wireless sensor networks: A survey [J]. IEEE Communications Surveys & Tutorials, 2012, 99:1–20.
BACHIR A, DOHLER M, WATTEYNE T, LEUNG K K. MAC essentials for wireless sensor networks [J]. IEEE Communications Surveys & Tutorials, 2010, 12(2):222–248.
HU Jun, MA Zeng, SUN Chun-sheng. Energy-efficient MAC protocol designed for wireless sensor network for iot [C]// 7th International Conference on Computational Intelligence and Security. Haikou, China, 2011:721–725.
YE W, HEIDEMANN J, ESTRIN D. An energy-efficient MAC protocol for wireless sensor networks [C]// Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies. New York, USA, 2002:1567–1576.
DAM T V, LANGENDOEN K. An adaptive energy-efficient MAC protocol for wireless sensor networks [C]// Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles, USA, 2003:171–180.
ZHOU You-ling, LIU Wen-jin, HUANG Ben-xiong, LIU Ang-li. A duty cycle adaptive algorithm based on throughput [C]// International Conference on Information Technology and Computer Science. Kiev, 2009:39–42.
LEE W, NGUYEN M, VERMA A, LEE H. Schedule unifying algorithm extending network lifetime in S-MAC-based wireless sensor networks [J]. IEEE Transactions on Wireless Communications, 2009, 8(9):4375–4379.
XING G, KLUES K, LU C. Towards unified radio power management for wireless sensor networks [J]. Journal of Wireless Communications & Mobile Computing, 2009, 9(3):313–323.
ITOH T, ZHANG Y, MATSUMOTO M, MAEDA R. Wireless sensor network for power consumption reduction in information and communication systems [C]// Proceedings of 8th Annual IEEE Conference on Sensors. Christchurch, 2009:572–575.
ARULMOZHI K, DHULIPALA V R S, PRABAKARAN R. A study on optimized power consumption routing in wireless sensor networks [C]// Proceeding of the 3rd International Conference on Electronics Computer Technology. Kanyakumari, 2011:271–274.
MANIVANNAN D, VIJAYALAKSHMI B, NEELAMEGAM P. An efficient authentication protocol based on congruence for wireless sensor networks [C]// Proceeding of International Conference on Recent Trends in Information Technology. Chennai, Tamil Nedu, 2011:549–554.
WANG H. A robust mechanism for wireless sensor network security [C]// Proceeding of the 4th International Conference on Wireless Communication. Networking and Mobile Computing. Dalian, China, 2008:1–4.
LU X, SPEAR M, LEVITT K, WU S F. A synchronization attack and defense in energy-efficient listen-sleep slotted MAC protocols [C]// Proceeding of 2nd International Conference on Emerging Security Information. System and Technologies. Cap esterel, 2008:403–411.
FENG Zi, NING Jian-xia, IOANNIS BROUSTIS. Copying with packet replay attacks in wireless networks [C]// Proceeding of the 8th Annual IEEE Communications Society Conference on Sensor. Mesh, and Ad Hoc Communications and Networks. Salt Lake City, USA, 2011:368–376.
RAYMOND D R, MARCHANY R C, BROWNFIELD M I, MIDKIFF S F. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols [J]. IEEE Transaction on Vehicular Technology, 2009, 58(1):367–380.
SOLOMON W. GOLOMB. Digital communication with space application [M]. California, USA: Prentice-Hall Press, 1964:48–53.
NO J, CHUNG H, YUN M. Binary pseudorandom sequences of period 2m-1 with ideal autocorrelation generated by the polynomial Z d+(Z+1)d [J]. IEEE Transactions on Information Theory, 1998, 44(3):1278–1282.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Son, Yh., Hong, Jk. & Bae, Ks. Authentication masking code against DoS of T-MAC protocol. J. Cent. South Univ. 20, 1889–1895 (2013). https://doi.org/10.1007/s11771-013-1687-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11771-013-1687-4