Mosharaka for Research and Studies
Login/Sign Up
Main Menu
Papers Menu
Quick Links
Next Congress
Congresses

All Forthcoming Congresses

Conferences

All Forthcoming Conferences

170 days remaining to submit papers to MIC-Wireless 2025 in Irbid, Jordan
Papers Links
  • Browse
  • Search
  • Subjects
  • Years
  • CNIT
  • GC-CNIT 2009
  • 14.Cnf-51
Papers Published at GC-CNIT 2009
All 10 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-583 Dr. Abdulkader O. Alwer

New Method to reduce Latency in Fast Handover for MIPv6 on Predictive Mode
13-21
14.Cnf-599



Harmonic Based Patching Scheme for VOD
22-29
14.Cnf-603 Dr. Amer M. Al Canaan
Prof. Ahmed Khoumsi
Analysis and Quantification of Multimedia Web Services Performance Utilising Binary Data Compression
30-35
14.Cnf-665
Polynomial-Time Decodable Fingerprinting Codes for Multimedia
36-41
14.Cnf-695
A New Intrusion Detection System Model for Local Network Based on Support Vector Machine
42-46
14.Cnf-750
NEW SCHEME TO REDUCE DISCOVERY DELAY IN WIRELESS MESH NETWORKS BASED ON HANDOFF HISTORY
47-52
14.Cnf-829
Performance Analysis of Concurrent Transmission in Multi-hop Wireless Mesh Networks
53-59
14.Cnf-830 Muhammad Q. Khan
Prof. Steinar H. Andresen
Application of media independent handover (MIH) for intra technology handover
60-63
14.Cnf-51 Paper View Page
Title Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
Authors Dr. Iman Almomani, University of Jordan, Amman, Jordan
Ms. Ola Karajeh, University of Jordan, Amman, Jordan
Ms. Lamya Abdullah, University of Erlangen, Erlangen, Germany
Abstract Broadcast authentication is an important process that is used to secure the applications from different kinds of attacks including Denial of service (DoS) attacks. Timed Efficient Stream Loss-tolerant Authentication (TESLA) and Digital Signature are used in Wireless Sensor Networks (WSNs) to provide broadcast authentication, but both are vulnerable to DoS attacks; attackers keep broadcasting forged messages which will cause extra cost on the network due to the power consumption. This will exhaust the node’s energy, which consequently reduces the network’s lifetime. In this paper we first present related schemes that are trying to defend against or contain such DoS attacks. Secondly, we propose a new scheme that allows the receiver sensor node to recognize forged message before verifying its authenticity in order to avoid performing many unnecessary operations and so preventing DoS from damaging the availability of the network and additionally reducing the delay that is resulted from the verification itself. The proposed scheme protects nodes by using adaptive window after passing a weak pre-authenticator test. A security analysis for the propose scheme is presented at the end of the paper.
Track CCN: Communications and Computer Networks
Conference 3rd Mosharaka International Conference on Communications, Networking and Information Technology (MIC-CNIT 2009)
Congress 2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009), 21-23 December 2009, ,
Pages 6-12
Topics Wireless Ad hoc Networks
Network Security and Privacy
Wireless Sensor Networks
Wireless Communication Networks
ISSN 2227-331X
DOI
BibTeX @inproceedings{51CNIT2009,
title={Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks},
author={Iman Almomani, and Ola Karajeh, and Lamya Abdullah},
booktitle={2009 Global Congress on Communications, Networking and Information Technology (GC-CNIT 2009)},
year={2009},
pages={6-12},
doi={}},
organization={Mosharaka for Research and Studies} }
Paper Views 195 Paper Views Rank 29/524
Paper Downloads 75 Paper Downloads Rank 70/524
  • By Title
  • By Topic
  • By Author
  • Contents
Search Papers by Title

Search for Papers

Search Papers by Topic
ByTopic
Search Paper Contents
All 10 Papers
IDAuthors and TitlePages
14.Cnf-50 Dr. Iman Almomani
Ms. Maryam Al-Sharief
Ms. Rawa'a Aljabaly
Building reputation of suspicious nodes in cluster-based intrusion detection system for wireless sensors networks
1-5
14.Cnf-51 Dr. Iman Almomani
Ms. Ola Karajeh
Ms. Lamya Abdullah
Pre-authenticator and adaptive window-based DoS containing scheme for broadcast authentication in wireless sensor networks
6-12
14.Cnf-583 Dr. Abdulkader O. Alwer

New Method to reduce Latency in Fast Handover for MIPv6 on Predictive Mode
13-21
14.Cnf-599



Harmonic Based Patching Scheme for VOD
22-29
14.Cnf-603 Dr. Amer M. Al Canaan
Prof. Ahmed Khoumsi
Analysis and Quantification of Multimedia Web Services Performance Utilising Binary Data Compression
30-35
14.Cnf-665
Polynomial-Time Decodable Fingerprinting Codes for Multimedia
36-41
14.Cnf-695
A New Intrusion Detection System Model for Local Network Based on Support Vector Machine
42-46
14.Cnf-750
NEW SCHEME TO REDUCE DISCOVERY DELAY IN WIRELESS MESH NETWORKS BASED ON HANDOFF HISTORY
47-52
14.Cnf-829
Performance Analysis of Concurrent Transmission in Multi-hop Wireless Mesh Networks
53-59
14.Cnf-830 Muhammad Q. Khan
Prof. Steinar H. Andresen
Application of media independent handover (MIH) for intra technology handover
60-63
GC-CNIT 2009 Visits: 3924||MIC-CNIT 2009 Visits: 3186||CCN Track Visits: 1314