DocumentCode :
744003
Title :
State Machine-Based Security Fusion for Resource-Constrained Environments
Author :
Nair, Saurabh ; Al Ibrahim, Omar ; Abraham, S.
Author_Institution :
SMU HACNet Labs., Southern Methodist Univ., Dallas, TX, USA
Volume :
7
Issue :
3
fYear :
2013
Firstpage :
430
Lastpage :
441
Abstract :
A growing range of devices has difficulty in implementing strong cryptographic algorithms. Radio frequency IDs and sensors, for instance, generally lack the processing power and memory to perform these operations in an efficient and timely manner. Recently, a new paradigm in security, called security fusion, was introduced for resource-constrained environments. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising system-level security. In this paper, we describe a state machine-based architecture and pertinent protocols to realize security fusion. Furthermore, we analyze these protocols for their security capabilities.
Keywords :
cryptographic protocols; finite state machines; minimisation; cryptographic algorithms; point-to-point properties; resource requirement minimization; resource-constrained environments; security protocols; state machine-based architecture; state machine-based security fusion; Authentication; Complexity theory; Computer architecture; Cryptography; Protocols; Sensors; Radio frequency ID (RFID); security; sensors; state machines;
fLanguage :
English
Journal_Title :
Systems Journal, IEEE
Publisher :
ieee
ISSN :
1932-8184
Type :
jour
DOI :
10.1109/JSYST.2012.2221900
Filename :
6392199
Link To Document :
بازگشت