Broadcast authentication for resource constrained devices: A major pitfall and some solutions

Roberto Di Pietro, Fabio Martinelli, Nino Vincenzo Verde

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification. © 2012 IEEE.
Original languageEnglish (US)
Title of host publicationProceedings of the IEEE Symposium on Reliable Distributed Systems
Pages213-218
Number of pages6
DOIs
StatePublished - Dec 1 2012
Externally publishedYes

Fingerprint

Dive into the research topics of 'Broadcast authentication for resource constrained devices: A major pitfall and some solutions'. Together they form a unique fingerprint.

Cite this