Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions | IEEE Conference Publication | IEEE Xplore

Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions


Abstract:

Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast ...Show More

Abstract:

Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification.
Date of Conference: 08-11 October 2012
Date Added to IEEE Xplore: 31 January 2013
ISBN Information:

ISSN Information:

Conference Location: Irvine, CA, USA

Contact IEEE to Subscribe

References

References is not available for this document.