Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages

نویسندگان

  • Sonia Thomas
  • Elisabeth Thomas
چکیده

a broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control messages to work efficiently. This paper compare various message authentication schemes like symmetric, asymmetric cryptographic methods, delayed key disclosure methods, signature amortization techniques, one time signatures, online-offline signatures and rapid authentication scheme. On analyzing we found that rapid authentication is more efficient for broadcast authentication of command and control messages with real time applications. Keywords—Broadcast authentication, digital signature, verification.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emergent Response (ER): An Efficient and Scalable Real-time Broadcast Authentication Scheme for Command and Control Messages

Broadcast (multicast) authentication is crucial for large and distributed systems such as cyber-physical infrastructures (e.g., power-grid/smart-grid) and wireless networks (e.g., inter-vehicle networks, military ad-hoc networks). These timecritical systems require real-time authentication of command and control messages in a highly efficient, secure and scalable manner. However, existing solut...

متن کامل

Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks

In wireless sensor networks (WSNs), broadcast authentication allows only legitimate users (or senders) to disseminate messages into the networks. μTESLA [14] is the first broadcast authentication scheme for WSNs. It allows only few users, mainly several base stations, to broadcast messages, but in reality there are many scenarios that require a large number of dynamic users (mobile sinks or use...

متن کامل

ARMS: An Authenticated Routing Message in Sensor Networks

In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a se...

متن کامل

A Survey on Security Challenges and Malicious Vehicle Detection in Vehicular Ad Hoc Networks

In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application. Authentication on such safety messages assures the end users in the network. However, a malicious vehicle can trace the messages and can launch varied types of malicious activity which leads to the compromise of ...

متن کامل

Self-Healing Key Distribution Schemes for Wireless Networks: A Survey

The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the reduction of energy consumption due to the elimination of such additional transmission. Also in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015