DocumentCode :
3143970
Title :
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions
Author :
Pietro, Roberto ; Martinelli, F. ; Verde, Nino Vincenzo
Author_Institution :
Dept. of Math., Univ. of Roma Tre, Rome, Italy
fYear :
2012
fDate :
8-11 Oct. 2012
Firstpage :
213
Lastpage :
218
Abstract :
Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification.
Keywords :
broadcast communication; protocols; telecommunication security; wireless sensor networks; WSN; broadcast authentication; protocols; resource constrained devices; security mechanism; wireless sensor networks; Actuators; Authentication; Base stations; Protocols; Receivers; Sensors; Wireless sensor networks; Broadcast Authentication; DAC attack; WSN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on
Conference_Location :
Irvine, CA
ISSN :
1060-9857
Print_ISBN :
978-1-4673-2397-0
Type :
conf
DOI :
10.1109/SRDS.2012.13
Filename :
6424856
Link To Document :
بازگشت