Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Papers Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

Update on Monday, 29 June 2020: Dr. Lina Montuori becomes Chairperson of MIC-Power 2020.
Papers Links
MIC-CNIT 2009
  • Browse
  • Search
  • New
  • Subjects
  • Years
  • CNIT
  • MIC-CNIT 2009
  • 14.Cnf-51
Browse Paper Database by Year
20072008200920102012
201320142020
Papers Published at MIC-CNIT 2009
All 3 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-830 Muhammad Q. Khan
Prof. Steinar H. Andresen
Application of media independent handover (MIH) for intra technology handover
13-16
14.Cnf-51 Paper View Page
Title Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
Authors Dr. Iman Almomani, University of Jordan, Amman, Jordan
Ms. Ola Karajeh, University of Jordan, Amman, Jordan
Ms. Lamya Abdullah, University of Erlangen, Erlangen, Germany
Abstract Broadcast authentication is an important process that is used to secure the applications from different kinds of attacks including Denial of service (DoS) attacks. Timed Efficient Stream Loss-tolerant Authentication (TESLA) and Digital Signature are used in Wireless Sensor Networks (WSNs) to provide broadcast authentication, but both are vulnerable to DoS attacks; attackers keep broadcasting forged messages which will cause extra cost on the network due to the power consumption. This will exhaust the node’s energy, which consequently reduces the network’s lifetime. In this paper we first present related schemes that are trying to defend against or contain such DoS attacks. Secondly, we propose a new scheme that allows the receiver sensor node to recognize forged message before verifying its authenticity in order to avoid performing many unnecessary operations and so preventing DoS from damaging the availability of the network and additionally reducing the delay that is resulted from the verification itself. The proposed scheme protects nodes by using adaptive window after passing a weak pre-authenticator test. A security analysis for the propose scheme is presented at the end of the paper.
Track CCN: Communications and Computer Networks
Conference 3rd Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009), 21-23 December 2009, Amman, Jordan
Pages 6-12
Topics Wireless Ad hoc Networks
Network Security and Privacy
Wireless Sensor Networks
Wireless Communication Networks
ISSN 2227-331X
Paper Views 649 Paper Views Rank 36/499
Paper Downloads 353 Paper Downloads Rank 27/499
  • By Title
  • By Topic
  • By Author
  • Contents
Search Papers by Title
ByTitle
Search Papers by Topic
ByTopic
Search Paper Contents
All 3 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-830 Muhammad Q. Khan
Prof. Steinar H. Andresen
Application of media independent handover (MIH) for intra technology handover
13-16
Papers Newly Added to Database
PapersCDBNew
GC-CNIT 2009 Visits: 815||MIC-CNIT 2009 Visits: 529||CCN Track Visits: 290