Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification. © 2012 IEEE.

Broadcast authentication for resource constrained devices: A major pitfall and some solutions

Di Pietro R;Martinelli F;
2012

Abstract

Broadcast authentication is an important security mechanism for resource constrained devices, like Wireless Sensor Networks (WSNs). In this paper we revise how broadcast authentication has been enforced in this context, and we show that most of the current implementations (generally based on lightweight hash chain implementing time limited validity of the authentication property) leave open the possibility of a dreadful attack. We detail such an attack, and propose three different protocols to cope with it: PASS, TASS, and PTASS. We further analyze the overhead introduced by these protocols in terms of set-up, transmission overhead, and on device verification. © 2012 IEEE.
2012
Istituto di informatica e telematica - IIT
Inglese
IEEE 31st Symposium onReliable Distributed Systems (SRDS)
213
218
6
978-0-7695-4784-8
http://www.scopus.com/inward/record.url?eid=2-s2.0-84874339565&partnerID=q2rCbXpz
Sì, ma tipo non specificato
08-11/10/2012
Irvine, CA
Broadcast Authentication
DAC attack
WSN
2
none
Di Pietro R.; Martinelli F.; Verde N.V.
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/313420
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact