Constrained Function-Based Message Authentication for Sensor Networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploring Message Authentication in Sensor Networks

This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and physical and virtual multipath authentication. While end-to-end authentication provides the highest and most general security level, it may be too costly or impractical to implement. On the other end of the security scale, hop-to-...

متن کامل

Identity Based Message Authentication for Dynamic Networks

This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...

متن کامل

Constrained Function Based En-Route Filtering for Sensor Networks

Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Message Authentication in Sensor Networks Using En-route Filtering

-------------------------------------------------------------------ABSTRACT---------------------------------------------------In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink).such attacks by comp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2011

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2011.2106120