Emergent Response (ER): An Efficient and Scalable Real-time Broadcast Authentication Scheme for Command and Control Messages

نویسنده

  • Attila A. Yavuz
چکیده

Broadcast (multicast) authentication is crucial for large and distributed systems such as cyber-physical infrastructures (e.g., power-grid/smart-grid) and wireless networks (e.g., inter-vehicle networks, military ad-hoc networks). These timecritical systems require real-time authentication of command and control messages in a highly efficient, secure and scalable manner. However, existing solutions are either computationally costly (e.g., asymmetric cryptography) or unscalable/impractical (e.g., symmetric cryptography, one-time signatures, delayed key disclosure methods). In this paper, we develop a new broadcast authentication scheme that we call Emergent Response (ER), which is suitable for time-critical authentication of command and control messages in large and distributed systems. We exploit the semi-structured nature of command and control messages to construct special digital signatures, which are computationally efficient both at the signer and verifier sides. We show that ER achieves several desirable properties that are not available in the existing alternatives simultaneously: (i) Fast signature generation and verification; (ii) immediate verification; (iii) constant size public key; (iv) compact authenticating tag; (v) packet loss tolerance; (vi) being free from time synchronization requirement; (vii) provable security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages

a broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control ...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks

Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Though authentication of broadcast messages is probably the most critical primitive, certain applications such as battlefield control and natural resource management also require the broadcast data to be kept secret from eavesdroppers. In this paper we design, imple...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Maximum Life-time Broadcast Authentication Protocol for Wireless Sensor Networks

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows a sender to broadcast messages to multiple nodes in an authenticated way. Symmetric key based schemes such as μTESLA and μTESLA-like schemes have been proposed to provide such services for WSNs, however, the life-time of these schemes is constrained by the length of the key chains. To addres...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013