Skip to main content
Log in

Authentication masking code against DoS of T-MAC protocol

  • Published:
Journal of Central South University Aims and scope Submit manuscript

Abstract

Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. HUANG P, XIAO L, SOTTANI S, MUTKA M, XI N. The evolution of MAC protocols in wireless sensor networks: A survey [J]. IEEE Communications Surveys & Tutorials, 2012, 99:1–20.

    Google Scholar 

  2. BACHIR A, DOHLER M, WATTEYNE T, LEUNG K K. MAC essentials for wireless sensor networks [J]. IEEE Communications Surveys & Tutorials, 2010, 12(2):222–248.

    Article  Google Scholar 

  3. HU Jun, MA Zeng, SUN Chun-sheng. Energy-efficient MAC protocol designed for wireless sensor network for iot [C]// 7th International Conference on Computational Intelligence and Security. Haikou, China, 2011:721–725.

    Google Scholar 

  4. YE W, HEIDEMANN J, ESTRIN D. An energy-efficient MAC protocol for wireless sensor networks [C]// Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies. New York, USA, 2002:1567–1576.

    Google Scholar 

  5. DAM T V, LANGENDOEN K. An adaptive energy-efficient MAC protocol for wireless sensor networks [C]// Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. Los Angeles, USA, 2003:171–180.

    Google Scholar 

  6. ZHOU You-ling, LIU Wen-jin, HUANG Ben-xiong, LIU Ang-li. A duty cycle adaptive algorithm based on throughput [C]// International Conference on Information Technology and Computer Science. Kiev, 2009:39–42.

    Google Scholar 

  7. LEE W, NGUYEN M, VERMA A, LEE H. Schedule unifying algorithm extending network lifetime in S-MAC-based wireless sensor networks [J]. IEEE Transactions on Wireless Communications, 2009, 8(9):4375–4379.

    Article  Google Scholar 

  8. XING G, KLUES K, LU C. Towards unified radio power management for wireless sensor networks [J]. Journal of Wireless Communications & Mobile Computing, 2009, 9(3):313–323.

    Article  Google Scholar 

  9. ITOH T, ZHANG Y, MATSUMOTO M, MAEDA R. Wireless sensor network for power consumption reduction in information and communication systems [C]// Proceedings of 8th Annual IEEE Conference on Sensors. Christchurch, 2009:572–575.

    Google Scholar 

  10. ARULMOZHI K, DHULIPALA V R S, PRABAKARAN R. A study on optimized power consumption routing in wireless sensor networks [C]// Proceeding of the 3rd International Conference on Electronics Computer Technology. Kanyakumari, 2011:271–274.

    Google Scholar 

  11. MANIVANNAN D, VIJAYALAKSHMI B, NEELAMEGAM P. An efficient authentication protocol based on congruence for wireless sensor networks [C]// Proceeding of International Conference on Recent Trends in Information Technology. Chennai, Tamil Nedu, 2011:549–554.

    Google Scholar 

  12. WANG H. A robust mechanism for wireless sensor network security [C]// Proceeding of the 4th International Conference on Wireless Communication. Networking and Mobile Computing. Dalian, China, 2008:1–4.

    Google Scholar 

  13. LU X, SPEAR M, LEVITT K, WU S F. A synchronization attack and defense in energy-efficient listen-sleep slotted MAC protocols [C]// Proceeding of 2nd International Conference on Emerging Security Information. System and Technologies. Cap esterel, 2008:403–411.

    Google Scholar 

  14. FENG Zi, NING Jian-xia, IOANNIS BROUSTIS. Copying with packet replay attacks in wireless networks [C]// Proceeding of the 8th Annual IEEE Communications Society Conference on Sensor. Mesh, and Ad Hoc Communications and Networks. Salt Lake City, USA, 2011:368–376.

    Google Scholar 

  15. RAYMOND D R, MARCHANY R C, BROWNFIELD M I, MIDKIFF S F. Effects of denial-of-sleep attacks on wireless sensor network MAC protocols [J]. IEEE Transaction on Vehicular Technology, 2009, 58(1):367–380.

    Article  Google Scholar 

  16. SOLOMON W. GOLOMB. Digital communication with space application [M]. California, USA: Prentice-Hall Press, 1964:48–53.

    Google Scholar 

  17. NO J, CHUNG H, YUN M. Binary pseudorandom sequences of period 2m-1 with ideal autocorrelation generated by the polynomial Z d+(Z+1)d [J]. IEEE Transactions on Information Theory, 1998, 44(3):1278–1282.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Young-ho Son.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Son, Yh., Hong, Jk. & Bae, Ks. Authentication masking code against DoS of T-MAC protocol. J. Cent. South Univ. 20, 1889–1895 (2013). https://doi.org/10.1007/s11771-013-1687-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11771-013-1687-4

Key words

Navigation