Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols

نویسندگان

چکیده

Data and signal authentication schemes are being proposed to address Global Navigation Satellite Systems' (GNSS) vulnerability spoofing. Due the low power of their signals, bandwidth available for in GNSS is scarce. Since delayed-disclosure protocols, e.g., TESLA (timed-efficient stream loss-tolerant authentication), efficient terms robust impairments, they have been implemented by GNSS. The length message codes (MACs) cryptographic keys two crucial aspects protocol design as an impact on utilized bandwidth, therefore performance. We analyze both detail GNSS-TESLA present recommendations yet safe MAC key lengths. further complement this analysis proposing possible success failure policies quantify reduction attack surface resulting from employing them. shows that some cases it use sizes smaller than those best-practice guidelines. While our considerations general lightweight protocols data authentication, we particularize them protocols.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MAC Based Lightweight Protocols for Strong Authentication and Key Exchange

Protocols that provide authentication and key distribution are mainly based on symmetric and asymmetric ciphers. In recent years, some approaches have been introduced that are based on strong one-way hash functions, and further enhancements to these approaches are given in this paper. The lightweight protocols that are presented in this paper are suitable for implementation with simple logic. T...

متن کامل

a contrastive analysis of concord and head parameter in english and azerbaijani

این پایان نامه به بررسی و مقایسه دو موضوع مطابقه میان فعل و فاعل (از نظر شخص و مشار) و هسته عبارت در دو زبان انگلیسی و آذربایجانی می پردازد. اول رابطه دستوری مطابقه مورد بررسی قرار می گیرد. مطابقه به این معناست که فعل مفرد به همراه فاعل مفرد و فعل جمع به همراه فاعل جمع می آید. در انگلیسی تمام افعال، بجز فعل بودن (to be) از نظر شمار با فاعلشان فقط در سوم شخص مفرد و در زمان حال مطابقت نشان میدهند...

15 صفحه اول

passivity in waiting for godot and endgame: a psychoanalytic reading

this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...

the stady and analysis of rice agroclimatology in lenjan

the west of esfahan province, iran, is one of the most important agricultural areas throughout the country due to the climate variability and life-giving water of zayanderood river. rice is one of the major and economic crops in this area. the most important climatic elements in agricultural activities which should be considered include temperature, relative humidity, precipitation and wind. so...

15 صفحه اول

Authentication and Key Agreement Protocols Preserving Anonymity

Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication and key agreement (AKA) protocols: the AKA protocol with user anonymity (UAP) and the AKA protocol with user and server anonymity (USAP). The proposed protocols have the following advantages: first of all, they preserve ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Aerospace and Electronic Systems

سال: 2021

ISSN: ['1557-9603', '0018-9251', '2371-9877']

DOI: https://doi.org/10.1109/taes.2021.3053129