A source authentication and data confidentiality scheme based on TESLA protocol and XOR encryption for multicast
نویسندگان
چکیده
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملAuthenticast: a source authentication protocol for multicast flows and streams
The lack of security obstructs a large scale deployment of the multicast communication model. Therefore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity and access control. Many applications require authenticating the source of the received traffic, such as br...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA TESLA-Based Mutual Authentication Protocol for GSM Networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key and difficult problem. To solve it, a new approach is afforded based on the basic tree hashing protocol. The performance evaluation shows there are less computation and communication overheads in it, so which is reas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Perceptive and Cognitive Computing
سال: 2016
ISSN: 2462-229X
DOI: 10.31436/ijpcc.v2i2.23