نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

2005
Peng Ning An Liu Wenliang Du

Broadcast authentication is a critical security service in wireless sensor networks. There are a number of benefits to provide broadcast authentication with digital signatures, such as immediate authentication capability and the ease of managing cryptographic keys, compared with the alternative of TESLA-based approaches. Though previously considered infeasible, recent results have demonstrated ...

2009
Kui Ren Wenjing Lou Yanchao Zhang

Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure way. Previous solutions on broadcast authentication are mostly symmetric-key-based solutions such as μTESLA and multilevel μTESLA. These schemes are usually efficient; however, they all suffer from severe ene...

2007
Patrick Schaller Srdjan Capkun David A. Basin

We present two broadcast authentication protocols based on delayed key disclosure. Our protocols rely on symmetric-key cryptographic primitives and use cryptographic puzzles to provide efficient broadcast authentication in different application scenarios, including those with resource-constrained wireless devices such as sensor nodes. The strong points of the protocols proposed are that one all...

Journal: :I. J. Network Security 2007
Mahalingam Ramkumar

We introduce a novel cryptographic paradigm of broadcast authentication with “preferred” verifiers (BAP). With BAP, the message source explicitly targets a set of one or more verifiers. For an attacker, forging authentication data of a source, for purposes of fooling preferred verifiers may be substantially more difficult than fooling other (non-preferred) verifiers. We investigate broadcast au...

2005
Suk-Bok Lee Yoon-Hwa Choi

In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a se...

2010
Xinxin Fan Guang Gong

In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the ...

2010
Tomas Vanek Matej Rohlik

This paper deals with simulation of the broadcast authentication protocols using Coloured Petri Nets (CPN). CPN is a special instance of an orientated graph which enables to describe data flows and information dependencies inside of modeled systems. Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Colour Petri Nets can be used to create a fully functional ...

2002
Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. This arti...

2002
Leonid Reyzin Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. The autho...

2013
M.Ramesh Kumar Gnana Dhas

Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other existing security schemes in WSN. Th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید