The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Seven cardinal properties of sensor network broadcast authentication
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Hash based digital signature schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
Hi-index | 0.01 |
Efficient broadcast authentication has seen a lot of work in the recent past. Most broadcast authentication protocols rely on an underlying Public Key Infrastructure (PKI) to provide a point of trust from which credentials for more efficient cryptographic mechanisms for broadcast authentication can be derived. Thus, there is a logical dependence of some cryptographic credentials (e.g., verifiers for one-time signatures) on others (e.g., certificates from the PKI). However, since V2V messages are transmitted using a random access broadcast, messages containing these credentials could be lost, thereby preventing the verification of credentials depending on the lost ones. Further, since the wireless bandwidth is precious, there have been proposals to optimize the transmission of certificates and other credentials over the air. The more infrequently these are transmitted, the more is the temporal dependence on the verification times of V2V messages. On the flip side, the more frequently these are transmitted, the more is the bandwidth overhead (i.e., greater packet size) and the more the chances of packet collisions over the air. We illustrate this dilemma by means of a case-study, and advocate a holistic approach to broadcast authentication.