2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC) 2014
DOI: 10.1109/pccc.2014.7017109
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…The protocol used in this paper is based on AODV, AODMV, and its variants in terms of routing aspects. For the security aspect, the technique used is based on μTESLA . However, the technique proposed in Liu and Ning and Perrig et al does not resolve the devastating DOS attacks during the commitment distribution.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The protocol used in this paper is based on AODV, AODMV, and its variants in terms of routing aspects. For the security aspect, the technique used is based on μTESLA . However, the technique proposed in Liu and Ning and Perrig et al does not resolve the devastating DOS attacks during the commitment distribution.…”
Section: Related Workmentioning
confidence: 99%
“…For the security aspect, the technique used is based on μTESLA. 20,21,30,36,41 However, the technique proposed in Liu and Ning 41 and Perrig et al 30 does not resolve the devastating DOS attacks during the commitment distribution. Our proposed techniques can be combined with these techniques to further enhance the security in sensor networks and aim to other aspects of security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Signature verification is often performed to support prediction outcomes from MHTs integrated into beacons ahead. The Prediction-based Authentication scheme is performed in three categories [9]:  TESLA scheme: It is the foremost step used in PBA. In this scheme a system requires excess time for chain key generations.…”
Section: Related Workmentioning
confidence: 99%
“…Although different network environments can contribute to different consumption of calculation, the proposed algorithm and TESLA both keep ( ), where is the number of hash calculations during authentication processes. However, in the protocol of multilevel TESLA [13], repeated hash operations are conducted to guarantee life time of keys at the expense of large amounts of calculations. For instance, denotes the time of high-level calculation while denotes that of lowlevel calculation in a 2-level TESLA process, which leads to ⋅ times of calculation.…”
Section: The Key Distribution Algorithm Based On Data Flow (1)mentioning
confidence: 99%