On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Fine-grained network time synchronization using reference broadcasts
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Practical Broadcast Authentication in Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Defense against outside attacks in wireless sensor networks
Computer Communications
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters
DCOSS '08 Proceedings of the 4th IEEE international conference on Distributed Computing in Sensor Systems
Fast Hash-Based Signatures on Constrained Devices
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Distance-Avoiding Sequences for Extremely Low-Bandwidth Authentication
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Efficient security primitives derived from a secure aggregation algorithm
Proceedings of the 15th ACM conference on Computer and communications security
On handling insider attacks in wireless sensor networks
Information Security Tech. Report
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
Short Hash-Based Signatures for Wireless Sensor Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Reliable and secure broadcast communication over resource constrained systems
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
Performance of broadcast authentication for secure V2V safety applications: a holistic view
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Performance of two one-time signature schemes in space/time constrained environments
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Enhancing broadcast authentication in sensor networks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
On the security of the Winternitz one-time signature scheme
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Flooding-resilient broadcast authentication for VANETs
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Enhancing broadcast authentication in sensor networks
Proceedings of the 14th Communications and Networking Symposium
Towards a theory of trust in networks of humans and computers
SP'11 Proceedings of the 19th international conference on Security Protocols
ESF: an efficient security framework for wireless sensor network
International Journal of Communication Networks and Distributed Systems
On the security of the Winternitz one-time signature scheme
International Journal of Applied Cryptography
Hi-index | 0.00 |
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, such that each approach can satisfy at most six of the seven proprieties. An empirical study of the design space reveals possibilities of new approaches, which we present in the following two new authentication protocols: RPT and LEA. Based on this taxonomy, we offer guidance in selecting the most appropriate protocol based on an application's desired proprieties. Finally, we pose the open challenge for the research community to devise a protocol simultaneously providing all seven properties.