Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages
نویسندگان
چکیده
a broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control messages to work efficiently. This paper compare various message authentication schemes like symmetric, asymmetric cryptographic methods, delayed key disclosure methods, signature amortization techniques, one time signatures, online-offline signatures and rapid authentication scheme. On analyzing we found that rapid authentication is more efficient for broadcast authentication of command and control messages with real time applications. Keywords—Broadcast authentication, digital signature, verification.
منابع مشابه
Emergent Response (ER): An Efficient and Scalable Real-time Broadcast Authentication Scheme for Command and Control Messages
Broadcast (multicast) authentication is crucial for large and distributed systems such as cyber-physical infrastructures (e.g., power-grid/smart-grid) and wireless networks (e.g., inter-vehicle networks, military ad-hoc networks). These timecritical systems require real-time authentication of command and control messages in a highly efficient, secure and scalable manner. However, existing solut...
متن کاملHybrid Multi-user Broadcast Authentication for Wireless Sensor Networks
In wireless sensor networks (WSNs), broadcast authentication allows only legitimate users (or senders) to disseminate messages into the networks. μTESLA [14] is the first broadcast authentication scheme for WSNs. It allows only few users, mainly several base stations, to broadcast messages, but in reality there are many scenarios that require a large number of dynamic users (mobile sinks or use...
متن کاملARMS: An Authenticated Routing Message in Sensor Networks
In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A general case for a sensor node to use a local broadcast is to advertise its routing information. Considering that sensor networks are vulnerable to a variety of attacks and current routing protocols are insecure, a se...
متن کاملA Survey on Security Challenges and Malicious Vehicle Detection in Vehicular Ad Hoc Networks
In Vehicular Ad hoc Networks (VANETs), vehicles periodically broadcast messages for every 100 to 300 milli seconds. Such messages are used to report a safety or non-safety application. Authentication on such safety messages assures the end users in the network. However, a malicious vehicle can trace the messages and can launch varied types of malicious activity which leads to the compromise of ...
متن کاملSelf-Healing Key Distribution Schemes for Wireless Networks: A Survey
The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the reduction of energy consumption due to the elimination of such additional transmission. Also in ...
متن کامل