2012 International Conference on Selected Topics in Mobile and Wireless Networking 2012
DOI: 10.1109/icost.2012.6271291
|View full text |Cite
|
Sign up to set email alerts
|

DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Moreover, the existence of batteries for sensor nodes utilizing cryptography decreases the lifetime of sensor node. There are a few important security management protocols in wireless sensor systems like SPIN [1] which comprises of two secure building squares: SNEP [2] and the other protocol named μTESLA [3]. Between both of the above, SNEP incorporates data security, di-party data approval, as well as confirmation of data integrity.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the existence of batteries for sensor nodes utilizing cryptography decreases the lifetime of sensor node. There are a few important security management protocols in wireless sensor systems like SPIN [1] which comprises of two secure building squares: SNEP [2] and the other protocol named μTESLA [3]. Between both of the above, SNEP incorporates data security, di-party data approval, as well as confirmation of data integrity.…”
Section: Introductionmentioning
confidence: 99%
“…In this modified scheme of TESLA that is TESLA++, the receiver shall store only the MAC address until it obtains the delayed key. This is done basically to reduce the memory requirement as just the shortened version of the sender's data is stored by the receiver [14]. Moreover, TESLA++ is much more secure method of authentication than TESLA.…”
Section: Tesla++mentioning
confidence: 99%
“…The design of TESLA is done basically for the broadcasting authentication in wireless ad-hoc network. TESLA is resilient to computational DOS attack because the technique symmetric cryptography is swifter than the use of signature which helps a great deal avoiding the delays, however TESLA is prone to attacks due to memory based denial of services [14] and this is the basic reason behind the development of TESLA++. The main concept behind TESLA is that to each packet a MAC (Message authentication code) is attached which is computed with a key K which is known to the user itself.…”
Section: Security Challenges Authentication Application and Trust Mmentioning
confidence: 99%
See 2 more Smart Citations