{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T15:55:24Z","timestamp":1762271724807,"version":"3.41.0"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2013,3,10]],"date-time":"2013-03-10T00:00:00Z","timestamp":1362873600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-0916221, CAREER-0447761, and CNS-0721424"],"award-info":[{"award-number":["CNS-0916221, CAREER-0447761, and CNS-0721424"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0916221, CAREER-0447761, and CNS-0721424"],"award-info":[{"award-number":["CNS-0916221, CAREER-0447761, and CNS-0721424"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2013,3,10]]},"abstract":"<jats:p>\n            Recent studies have demonstrated that it is feasible to perform public key cryptographic operations on resource-constrained sensor platforms. However, the significant energy consumption introduced by public key operations makes any public key-based protocol an easy target of Denial-of-Service (DoS) attacks. For example, if digital signature schemes such as ECDSA are used directly for broadcast authentication without further protection, an attacker can simply broadcast fake messages and force the receiving nodes to perform a huge number of unnecessary signature verifications, eventually exhausting their battery power. This paper shows how to mitigate such DoS attacks when digital signatures are used for broadcast authentication in sensor networks. Specifically, this paper first presents two filtering techniques, the\n            <jats:italic>group-based filter<\/jats:italic>\n            and the\n            <jats:italic>key chain-based filter<\/jats:italic>\n            , to handle the DoS attacks against signature verification. Both methods can significantly reduce the number of unnecessary signature verifications when a sensor node is under DoS attacks. This paper then combines these two filters and proposes a hybrid solution to further improve the performance.\n          <\/jats:p>","DOI":"10.1145\/2442116.2442123","type":"journal-article","created":{"date-parts":[[2013,4,9]],"date-time":"2013-04-09T12:17:58Z","timestamp":1365509878000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Providing DoS resistance for signature-based broadcast authentication in sensor networks"],"prefix":"10.1145","volume":"12","author":[{"given":"Qi","family":"Dong","sequence":"first","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX"}]},{"given":"Donggang","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, Arlington, TX"}]},{"given":"Peng","family":"Ning","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2013,4,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646757.705531"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P). 197--213","author":"Chan H.","key":"e_1_2_1_3_1"},{"volume-title":"http:\/\/www.xbow.com\/Products\/productdetails.aspx&quest;sid=164. Accessed","year":"2008","author":"Crossbow Technology Inc. 2008. MICAz 2.4GHz Wireless Module.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586117"},{"volume-title":"Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES).","author":"Gura N.","key":"e_1_2_1_6_1"},{"volume-title":"Tech. Rep. CU-CS-990-05, U. Colorado at Boulder.","year":"2005","author":"Hartung C.","key":"e_1_2_1_7_1"},{"volume-title":"Proceedings of INFOCOM.","author":"Hu Y.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"IEEE Computer Society. 2003. IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). IEEE Std 802.15.4-2003.  IEEE Computer Society. 2003. IEEE standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks specific requirements part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs). IEEE Std 802.15.4-2003."},{"volume-title":"Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications.","author":"Karlof C.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023650"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/346855.346865"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"volume-title":"Proceedings of 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON '04)","author":"Malan D. J.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325651.1325652"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"volume-title":"Proceedings of ACM International Symposium on Mobile and Ad Hoc Networking and Computing.","author":"Peng W.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958521"},{"volume-title":"http:\/\/focus.ti.com\/lit\/ds\/symlink\/cc2420.pdf. Accessed","year":"2008","author":"Texas Instruments Inc. 2008. 2.4 GHz IEEE 802.15.4 \/ZigBee-ready RF Transceiver.","key":"e_1_2_1_23_1"},{"volume-title":"Tech. Rep. WM-CS-2007-11","year":"2007","author":"Wang H.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288118"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"volume-title":"Proceedings of the Workshop on Mobile and Wireless Network (MWN).","author":"Zhu S.","key":"e_1_2_1_27_1"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2442116.2442123","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2442116.2442123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:06Z","timestamp":1750234746000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2442116.2442123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,10]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,3,10]]}},"alternative-id":["10.1145\/2442116.2442123"],"URL":"https:\/\/doi.org\/10.1145\/2442116.2442123","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2013,3,10]]},"assertion":[{"value":"2010-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}