An Attack Possibility on Time Synchronization Protocols Secured with TESLA-Like Mechanisms
نویسندگان
چکیده
We present a possible attack on time synchronization protocols which protect their broadcast or multicast messages with the TESLA protocol or one of its variants. We continue by presenting a customization of the TESLA mechanism that mitigates the aforementioned vulnerability and enables it to secure broadcast and multicast based time synchronization protocols.
منابع مشابه
Time Synchronization in Wireless Sensor Network
Time synchronization is a basic requirement for various applications in wireless sensor network, e.g., event detection, speeds estimating, environment monitoring, data aggregation, target tracking, scheduling and sensor nodes cooperation. Time synchronization is also helpful to save energy in WSN because it provides the possibility to set nodes into the sleeping mode. In wireless sensor network...
متن کاملTime Synchronization in Wireless Sensor Networks
Time synchronization is a basic requirement for various applications in wireless sensor network, e.g., event detection, speed estimating, environment monitoring, data aggregation, target tracking, scheduling and sensor nodes cooperation. Time synchronization is also helpful to save energy in WSN because it provides the possibility to set nodes into the sleeping mode. In wireless sensor networks...
متن کاملAttacks and Requirements of Time Synchronization
Time synchronization is a basic requirement for various applications in wireless sensor network, e.g., event detection, speeds estimating, environment monitoring, data aggregation, target tracking, scheduling and sensor nodes cooperation. Time synchronization is also helpful to save energy in WSN because it provides the possibility to set nodes into the sleeping mode. In wireless sensor network...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016