An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms

نویسندگان

  • Kristof Teichel
  • Dieter Sibold
  • Stefan Milius
چکیده

We present a possible attack on time synchronization protocols which protect their broadcast or multicast messages with the TESLA protocol or one of its variants. We continue by presenting a customization of the TESLA mechanism that mitigates the aforementioned vulnerability and enables it to secure broadcast and multicast based time synchronization protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time Synchronization in Wireless Sensor Network

Time synchronization is a basic requirement for various applications in wireless sensor network, e.g., event detection, speeds estimating, environment monitoring, data aggregation, target tracking, scheduling and sensor nodes cooperation. Time synchronization is also helpful to save energy in WSN because it provides the possibility to set nodes into the sleeping mode. In wireless sensor network...

متن کامل

Time Synchronization in Wireless Sensor Networks

Time synchronization is a basic requirement for various applications in wireless sensor network, e.g., event detection, speed estimating, environment monitoring, data aggregation, target tracking, scheduling and sensor nodes cooperation. Time synchronization is also helpful to save energy in WSN because it provides the possibility to set nodes into the sleeping mode. In wireless sensor networks...

متن کامل

Attacks and Requirements of Time Synchronization

Time synchronization is a basic requirement for various applications in wireless sensor network, e.g., event detection, speeds estimating, environment monitoring, data aggregation, target tracking, scheduling and sensor nodes cooperation. Time synchronization is also helpful to save energy in WSN because it provides the possibility to set nodes into the sleeping mode. In wireless sensor network...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016