{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:06:35Z","timestamp":1760241995010,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,18]],"date-time":"2018-11-18T00:00:00Z","timestamp":1542499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The use of signature-based broadcast authentication for code and data dissemination in wireless sensor networks (WSNs) cannot be avoided. It increases security but requires high computation. Adversaries can exploit the latter condition as an opportunity to send many false signatures. Filtering methods can overcome this vulnerability. Cipher Puzzle is a filtering method that has low storage overhead along with high security, especially against denial of service (DoS) attacks. However, its number of hash iterations cannot be bounded, which causes sender-side delay. This paper proposes a Dynamic Cipher Puzzle (DCP), which uses a threshold function to limit the number of hash iterations. Hence, time at the sender-side can be used more efficiently. Besides, its dynamic puzzle-strength increases the obscurity of the transmitted packet. Simulation and experimental results were analyzed with Arduino 2560. The theoretical results show that the quadratic function outperformed the compared methods. The scheme decreased sender-side delay by 94.6% with a guarantee of zero solution probability in 1.728     \u00d7  10  \u2212 13      . The experimental results show that the consumption of resources at the sensor node increases with an acceptable value. Moreover, DCP increases the complexity for the attacker to implement probability and signature-based DoS attacks.<\/jats:p>","DOI":"10.3390\/s18114021","type":"journal-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T09:18:25Z","timestamp":1542878305000},"page":"4021","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0294-7890","authenticated-orcid":false,"given":"Farah","family":"Afianti","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0783-3710","authenticated-orcid":false,"family":"Wirawan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0223-134X","authenticated-orcid":false,"given":"Titiek","family":"Suryani","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"8683","DOI":"10.3390\/s100908683","article-title":"Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem","volume":"10","author":"Eldefrawy","year":"2010","journal-title":"Sensors"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1007\/s11390-014-1443-8","article-title":"A Survey on Data Dissemination in Wireless Sensor Networks","volume":"29","author":"Zheng","year":"2014","journal-title":"J. Comput. Sci. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1016\/j.adhoc.2014.06.008","article-title":"A survey of broadcast authentication schemes for wireless networks","volume":"24","author":"Grover","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wirel. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1145\/1027794.1027800","article-title":"Multilevel \u03bc TESLA: Broadcast Authentication for Distributed Sensor Networks","volume":"3","author":"Liu","year":"2004","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"11","DOI":"10.4304\/jsw.3.3.11-20","article-title":"Broadcast authentication with practically unbounded one-way chains","volume":"3","author":"Groza","year":"2008","journal-title":"J. Softw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1109\/TC.2009.171","article-title":"Secure and efficient broadcast authentication in wireless sensor networks","volume":"59","author":"Kwon","year":"2010","journal-title":"IEEE Trans. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Liu, A., and Ning, P. (2008, January 22\u201324). TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks, St. Louis, MO, USA.","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"4554","DOI":"10.1109\/TVT.2009.2019663","article-title":"Multi-user broadcast authentication in wireless sensor networks","volume":"58","author":"Ren","year":"2009","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2106","DOI":"10.1109\/TWC.2012.032812.110433","article-title":"PKC based broadcast authentication using signature amortization for WSNs","volume":"11","author":"Liu","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"743623","DOI":"10.1155\/2015\/743623","article-title":"An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks","volume":"11","author":"Cheng","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2442116.2442123","article-title":"Providing DoS resistance for signature-based broadcast authentication in sensor networks","volume":"12","author":"Dong","year":"2013","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.cose.2012.09.012","article-title":"A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks","volume":"32","author":"Tan","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Aura, T., Nikander, P., and Leiwo, J. (2000). DOS-resistant authentication with client puzzles. International Workshop on Security Protocols, Springer.","DOI":"10.1007\/3-540-44810-1_22"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1325651.1325652","article-title":"Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks","volume":"4","author":"Ning","year":"2008","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Du, X., and Chen, H.H. (2008, January 19\u201323). Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks. Proceedings of the 2008 IEEE International Conference on Communications, Beijing, China.","DOI":"10.1109\/ICC.2008.319"},{"key":"ref_17","unstructured":"Dong, Q., and Liu, D. (April, January 31). Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks. Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Afianti, F., Wirawan, I., and Suryani, T. (2018). Dynamic Message Puzzle as Pre-Authentication Scheme in Wireless Sensor Networks. Int. J. Adv. Sci. Eng. Inf. Technol., in press.","DOI":"10.18517\/ijaseit.9.1.7582"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1016\/j.procs.2017.12.211","article-title":"Development of mobile electronic nose for beef quality monitoring","volume":"124","author":"Wijaya","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Afianti, F., Wirawan, I., and Suryani, T. (2017, January 7\u20139). Filtering methods for broadcast authentication against PKC-based denial of service in WSN: A survey. Proceedings of the Fifth International Conference on Wireless and Optical Communications, Singapore.","DOI":"10.1117\/12.2291341"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Meulenaer, G.D., Gosset, F., Standaert, F.X., and Pereira, O. (2008, January 12\u201314). On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks. Proceedings of the IEEE International Conference on Wireless and Mobile Computing (WIMOB\u201908), Avignon, France.","DOI":"10.1109\/WiMob.2008.16"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sethi, M., Arkko, J., and Keranen, A. (2012, January 22\u201325). End-to-end Security for Sleepy Smart Object Networks. Proceedings of the IEEE 37th Conference onLocal Computer Networks Workshops (LCN Workshops), Clearwater, FL, USA.","DOI":"10.1109\/LCNW.2012.6424089"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Xu, A., Li, M., Cai, J., Xue, N., Zhang, J., Liu, D., Craig, P., and Huang, X. (2016, January 23\u201325). Improving Efficiency of Authenticated OpenFlow Handshake using Coprocessors. Proceedings of the IEEE 8th International Conference on Information Technology in Medicine and Education (ITME), Fuzhou, China.","DOI":"10.1109\/ITME.2016.0136"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The Elliptic Curve Digital Signature Algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.comcom.2007.10.017","article-title":"IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks","volume":"31","author":"Cao","year":"2008","journal-title":"Comput. Commun."},{"key":"ref_27","unstructured":"Jech, T. (2013). Set Theory, Springer Science & Business Media."},{"key":"ref_28","first-page":"708","article-title":"Two Birds with One Stone: Two-Factor Authentication with Security beyond Conventional Bound","volume":"15","author":"Wang","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Xu, G., Qiu, S., Ahmad, H., Xu, G., Guo, Y., Zhang, M., and Xu, H. (2018). A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors, 18.","DOI":"10.3390\/s18072394"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s10623-013-9816-5","article-title":"Cryptographic puzzles and DoS resilience, revisited","volume":"73","author":"Groza","year":"2014","journal-title":"Des. Codes Cryptogr."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","article-title":"Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks","volume":"14","author":"Wang","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Jan, M.A., Nanda, P., He, X., and Liu, R.P. (2015, January 20\u201322). A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network. Proceedings of the Trustcom\/BigDataSE\/ISPA, Helsinki, Finland.","DOI":"10.1109\/Trustcom.2015.390"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1109\/TMC.2015.2449847","article-title":"Energy and Memory Efficient Clone Detection in Wireless Sensor Networks","volume":"15","author":"Zheng","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"4183","DOI":"10.1109\/ACCESS.2016.2594478","article-title":"An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/4021\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:30:29Z","timestamp":1760196629000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/4021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,18]]},"references-count":34,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["s18114021"],"URL":"https:\/\/doi.org\/10.3390\/s18114021","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,11,18]]}}}