DocumentCode
744003
Title
State Machine-Based Security Fusion for Resource-Constrained Environments
Author
Nair, Saurabh ; Al Ibrahim, Omar ; Abraham, S.
Author_Institution
SMU HACNet Labs., Southern Methodist Univ., Dallas, TX, USA
Volume
7
Issue
3
fYear
2013
Firstpage
430
Lastpage
441
Abstract
A growing range of devices has difficulty in implementing strong cryptographic algorithms. Radio frequency IDs and sensors, for instance, generally lack the processing power and memory to perform these operations in an efficient and timely manner. Recently, a new paradigm in security, called security fusion, was introduced for resource-constrained environments. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising system-level security. In this paper, we describe a state machine-based architecture and pertinent protocols to realize security fusion. Furthermore, we analyze these protocols for their security capabilities.
Keywords
cryptographic protocols; finite state machines; minimisation; cryptographic algorithms; point-to-point properties; resource requirement minimization; resource-constrained environments; security protocols; state machine-based architecture; state machine-based security fusion; Authentication; Complexity theory; Computer architecture; Cryptography; Protocols; Sensors; Radio frequency ID (RFID); security; sensors; state machines;
fLanguage
English
Journal_Title
Systems Journal, IEEE
Publisher
ieee
ISSN
1932-8184
Type
jour
DOI
10.1109/JSYST.2012.2221900
Filename
6392199
Link To Document