نتایج جستجو برای: TESLA Protocol

تعداد نتایج: 257266  

Journal: :RFC 2006
Steffen Fries Hannes Tschofenig

TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized...

2006
H. Tschofenig

TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized...

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

Journal: :Stroke: vascular and interventional neurology 2023

Background Mechanical thrombectomy has been shown to be effective in patients with acute ischemic stroke secondary large‐vessel occlusion and small moderate infarct volume. However, there are no randomized clinical trials for large‐core volume comparing mechanical medical therapy the population selected based solely on noncontrast computed tomography brain scan. The TESLA (Thrombectomy Emergent...

2002
Myla Archer

The TESLA multicast stream authentication protocol is distinguished from other types of cryptographic protocols in both its key management scheme and its use of timing. It takes advantage of the stream being broadcast to periodically commit to and later reveal keys used by a receiver to verify that packets are authentic, and it uses both inductive reasoning and time arithmetic to allow the rece...

2002
Myla Archer

The TESLA multicast stream authentication protocol is distinguished from other types of cryptographic protocols in both its key management scheme and its use of timing. It takes advantage of the stream being broadcast to periodically commit to and later reveal keys used by a receiver to verify that packets are authentic, and it uses both inductive reasoning and time arithmetic to allow the rece...

2002
Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. This arti...

Journal: :IFIP advances in information and communication technology 2016
Sérgio M. Câmara Dhananjay Anand Victoria Pillitteri Luiz Fernando Rust da Costa Carmo

Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used t...

2016
Kristof Teichel Dieter Sibold Stefan Milius

We present a possible attack on time synchronization protocols which protect their broadcast or multicast messages with the TESLA protocol or one of its variants. We continue by presenting a customization of the TESLA mechanism that mitigates the aforementioned vulnerability and enables it to secure broadcast and multicast based time synchronization protocols.

2003
Mathias Bohge Wade Trappe

In the near future wireless networks will consist of lowpowered, compute-constrained devices. These devices will have limited ability to perform the expensive computational operations associated with public key cryptography. This will limit the usefulness of conventional authentication mechanisms based on public key certificates in these domains. In this paper we introduce an alternative to con...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید