Performance Evaluation of Key Disclosure Delay-Based Schemes in Wireless Sensor Networks

被引:0
|
作者
Ben Jaballah, Wafa [1 ]
Mosbah, Mohamed [1 ]
Youssef, Habib
机构
[1] Univ Bordeaux, LaBRI, UMR 5800, F-33400 Talence, France
关键词
Source Authentication; Key Disclosure Delay; TOSSIM Simulator; Performance Evaluation; AUTHENTICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Broadcast source authentication is a critical security service in wireless sensor networks which is still in its infancy. This service allows senders to broadcast messages to multiple receivers in a secure way. This paper evaluates the integration of staggered authentication in multi-level mu Tesla source authentication protocol called staggered multi-level mu Tesla. These two protocols are evaluated in terms of authentication delay, authentication probability, number of forged packets in the receiver's buffer, delay of forged packets in the receiver's buffer, memory, and energy consumption overhead. Simulation results show that these two protocols introduce negligible overhead without impeding the system performance. Moreover, staggered multi-level mu Tesla achieves better performance compared to multi-level mu Tesla, when reducing the average number and the delay of forged packets in the receiver's buffer.
引用
收藏
页码:566 / 571
页数:6
相关论文
共 50 条
  • [1] Enhancing Delay-based Packet Forwarding Schemes in Wireless Sensor Networks
    Djamaa, Badis
    Aouf, Nabil
    Richardson, Mark
    Walters, Bob
    [J]. 2013 4TH ANNUAL INTERNATIONAL CONFERENCE ON ENERGY AWARE COMPUTING SYSTEMS AND APPLICATIONS (ICEAC), 2013, : 12 - 17
  • [2] Performance Evaluation of Key Management Schemes in Wireless Sensor Networks
    Khalil, Onder
    Ozdemir, Suat
    [J]. GAZI UNIVERSITY JOURNAL OF SCIENCE, 2012, 25 (02): : 465 - 476
  • [3] A Delay-Based Clustering Algorithm for Wireless Sensor Networks
    Shang, Fengjun
    Ren, Donghai
    [J]. COMPUTER SCIENCE FOR ENVIRONMENTAL ENGINEERING AND ECOINFORMATICS, PT 1, 2011, 158 : 463 - 468
  • [4] Evaluation of Key Management Schemes in Wireless Sensor Networks
    Jurnecka, Filip
    Stehlik, Martin
    Matyas, Vashek
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 198 - 203
  • [5] Delay-Based End-to-End Congestion Control for Wireless Sensor Networks
    Montes, Isabel
    Tiglao, Nestor
    Ocampo, Roel
    Festin, Cedric
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 497 - 502
  • [6] On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks
    Liu, Fang
    Cheng, Xiuzhen
    An, Fengguang
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [7] Performance Evaluation of ID Assignment Schemes for Wireless Sensor Networks
    Challa, Rama Krishna
    Sambyal, Rakesh
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 608 - 615
  • [8] Performance Evaluation of Data Aggregation Schemes in Wireless Sensor Networks
    Park, Sangjoon
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 413 - 418
  • [9] Performance Evaluation of a Polynomial based Key Management scheme in Wireless Sensor Networks
    Chakavarika, T. T.
    Chaurasia, B. K.
    Gupta, S. K.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 2114 - 2118
  • [10] A Taxonomy of Key Management Schemes of Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 690 - 696