Broadcast authentication for group communication
نویسندگان
چکیده
Traditional point-to-point message authentication systems have been extensively studied in the literature. In this paper, we consider authentication systems for group communication. The basic primitive is a multireceiver authentication system with dynamic senders (DMRA-code). In a DMRA-code any member of the group can broadcast an authenticated message to the rest of the group such that every other member of the group can individually verify the authenticity of the message. We give a 0exible ‘synthesis’ construction for DMRA-codes by combining an A-code and a key distribution pattern. tDMRA-codes extend this model when there are up to t senders. We give two constructions, one algebraic and one by ‘synthesis’ of an A-code and a perfect hash family. We show universality of ‘synthesis’ constructions for unconditional and computational models of security which means that our results have wider range applications. Finally, to demonstrate the usefulness of DMRA model, we modify a secure dynamic conferencekey distribution system to construct a secure dynamic conference system that provides secrecy and authenticity of communication among conferencees. The system is key-e5cient as its key requirement remains nearly the same as the original conference key distribution system and so authentication is e7ectively obtained without any extra cost. We discuss possible extensions to this work. c © 2001 Elsevier Science B.V. All rights reserved.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملI . The TESLA Broadcast Authentication Protocol
One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. The autho...
متن کاملEnsuring Feasible Communication for Integrating Wireless Sensor Networks Into The Internet of Things
Wireless sensor network is a group of specialized transducer with communication infrastructure for monitoring and recording at diverse location. There is a need for a secure channel between a sensor node and an internet host, during the integration of wireless sensor networks into the internet of things. By using Security protocols for Sensor networks (SPINS) scheme, it is possible to secure co...
متن کاملHBSAP : A Hop-by-Hop Broadcast Source Authentication Protocol for WSN to mitigate DoS Attacks
Broadcast communication is a dominant communication pattern in WSN. As a major security concern, the broadcast source authentication is needed to mitigate impersonation of a broadcast source, modifications of its broadcasted data, or depletion of the limited energy of sensors caused by an attacker injecting useless broadcast traffic. Several Broadcast Source Authentication Protocols (BSAPs) wer...
متن کاملAn Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
Lei et al. [26] proposed a new asymmetric group key agreement protocol allowing a set of users to negotiate a common encryption key accessible by any user, and each user holds her respective decryption key. This enables the confidential message communication among group users, and grants any outsider to send message to the group. In this paper, an authenticated asymmetric group key agreement pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Theor. Comput. Sci.
دوره 269 شماره
صفحات -
تاریخ انتشار 2001