• DocumentCode
    744003
  • Title

    State Machine-Based Security Fusion for Resource-Constrained Environments

  • Author

    Nair, Saurabh ; Al Ibrahim, Omar ; Abraham, S.

  • Author_Institution
    SMU HACNet Labs., Southern Methodist Univ., Dallas, TX, USA
  • Volume
    7
  • Issue
    3
  • fYear
    2013
  • Firstpage
    430
  • Lastpage
    441
  • Abstract
    A growing range of devices has difficulty in implementing strong cryptographic algorithms. Radio frequency IDs and sensors, for instance, generally lack the processing power and memory to perform these operations in an efficient and timely manner. Recently, a new paradigm in security, called security fusion, was introduced for resource-constrained environments. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising system-level security. In this paper, we describe a state machine-based architecture and pertinent protocols to realize security fusion. Furthermore, we analyze these protocols for their security capabilities.
  • Keywords
    cryptographic protocols; finite state machines; minimisation; cryptographic algorithms; point-to-point properties; resource requirement minimization; resource-constrained environments; security protocols; state machine-based architecture; state machine-based security fusion; Authentication; Complexity theory; Computer architecture; Cryptography; Protocols; Sensors; Radio frequency ID (RFID); security; sensors; state machines;
  • fLanguage
    English
  • Journal_Title
    Systems Journal, IEEE
  • Publisher
    ieee
  • ISSN
    1932-8184
  • Type

    jour

  • DOI
    10.1109/JSYST.2012.2221900
  • Filename
    6392199