DocumentCode :
1166857
Title :
Message Authentication in Computationally Constrained Environments
Author :
Arazi, Benjamin
Author_Institution :
Dept. of Electr. & Comput. Eng., Ben Gurion Univ., Beer-Sheva
Volume :
8
Issue :
7
fYear :
2009
fDate :
7/1/2009 12:00:00 AM
Firstpage :
968
Lastpage :
974
Abstract :
RFID and wireless sensor networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by hash message authentication codes (HMAC). As clearly stated in the literature, current approved implementations of HMAC require resources that cannot be supported in constrained components. An approach to implement a compact HMAC by the use of stream ciphering is presented in this paper.
Keywords :
message authentication; radiofrequency identification; telecommunication security; wireless sensor networks; RFID; hash message authentication codes; message authentication; message integrity; stream ciphering; time stamping; wireless sensor networks; HMAC; Secured communications; challenge response; constrained environments; stream ciphers.;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2009.40
Filename :
4785468
Link To Document :
بازگشت