I . The TESLA Broadcast Authentication Protocol

نویسندگان

  • Leonid Reyzin
  • Adrian Perrig
  • Ran Canetti
  • J. D. Tygar
  • Dawn Song
چکیده

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. The authors present TESLA (Timed Efficient Stream Loss-tolerant Authentication), an efficient broadcast authentication protocol with low communication and computation overhead. TESLA scales to large numbers of receivers and tolerates packet loss. It is based on loose time synchronization between the sender and the receivers, and uses only symmetric cryptographic functions. Still, and as is demonstrated herein, TESLA has possible

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

The TESLA Broadcast Authentication Protocol

One of the main challenges of securing broadcast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually untrusted receivers and unreliable communication environments where the sender does not retransmit lost packets. This arti...

متن کامل

Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks

In wireless sensor networks (WSN’s), the broadcast authentication is a critical security service, as it helps users to broadcast the WSN in an authenticable way. μ TESLA and MULTILEVEL μ TESLA are symmetric key based schemes, that have been introduced to provide such services for WSNs, but even they suffer from serious DoS attacks due to the delay in message authentication. Hence in order to ov...

متن کامل

An Expedited Triple Key Broadcast Authentication Scheme Based on Tesla , Ecdh , and Ecdsa

Wireless Sensor Networks (WSNs) are prone to various security breaches as they are placed in hostile environments. Several security and broadcast authentication mechanisms were proposed for securing the WSN fully via key exchange mechanisms, handshake protocols, and other routing protocols. But these existing schemes cannot detect a variety of attacks and are not competent in terms of detection...

متن کامل

A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation

In this paper we propose an efficient authentication and integrity scheme to support DGPS corrections using the RTCM protocol, such that the identified vulnerabilities in DGPS are mitigated. The proposed scheme is based on the TESLA broadcast protocol with modifications that make it suitable for the bandwidth and processor constrained environment of marine DGPS.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002