TY - GEN
T1 - Broadcast authentication for resource constrained devices: A major pitfall and some solutions
AU - Pietro, Roberto Di
AU - Martinelli, Fabio
AU - Verde, Nino Vincenzo
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2012/12/1
Y1 - 2012/12/1
N2 - Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification. © 2012 IEEE.
AB - Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification. © 2012 IEEE.
UR - http://ieeexplore.ieee.org/document/6424856/
UR - http://www.scopus.com/inward/record.url?scp=84874339565&partnerID=8YFLogxK
U2 - 10.1109/SRDS.2012.13
DO - 10.1109/SRDS.2012.13
M3 - Conference contribution
SP - 213
EP - 218
BT - Proceedings of the IEEE Symposium on Reliable Distributed Systems
ER -