Title :
Loss-tolerant confidential efficient authenticated broadcast scheme
Author :
Nasiraee, Hassan ; Mohasefi, Jamshid B.
Author_Institution :
Dept. of Comput. Sci. & Eng., Urmia Univ., Urmia, Iran
Abstract :
In symmetric cryptography, TESLA variants are well-known valuable source authentication broadcast scheme that are secure and efficient. But TESLA, versus asymmetric approaches, do not provide confidentiality and immediate authentication, need the synchronization of parties, are not flexible due to synchronization and finally have delayed verification and overflow problem. In this paper, we have proposed a novel secure broadcast protocol that is simple, secure and efficient like TESLA variants, to overcome shortages of TESLA variants. The method provides confidentiality and has two immediate and non-immediate authentication modes. It is loss-tolerant intrinsically, which with the best of our knowledge is the first loss-tolerant confidential authenticated broadcast scheme on lossy channels, which only uses symmetric keys. We show the proposal is efficient even on resource constrained networks by conducting a real world scenario experiment.
Keywords :
cryptographic protocols; telecommunication security; TESLA variants; loss-tolerant confidential efficient authenticated broadcast scheme; lossy channels; resource constrained networks; secure broadcast protocol; symmetric cryptography; valuable source authentication broadcast scheme; Authentication; Cryptography; Receivers; Resistance; Synchronization; Wireless sensor networks; Security; TESLA variants; confidential secure broadcast; lossy broadcast/multicast stream; time-varying keys; wireless sensor networks;
Conference_Titel :
Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on
Conference_Location :
Mashhad
Print_ISBN :
978-1-4799-5486-5
DOI :
10.1109/ICCKE.2014.6993363