Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels (CROSBI ID 519902)

Prilog sa skupa u zborniku | izvorni znanstveni rad | međunarodna recenzija

Čagalj, M. ; Čapkun, S. ; Rengaswamy, R. ; Tsigkogiannis, I. ; Srivastava, M. ; Hubaux, J.-P. Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels // Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2006). 2006

Podaci o odgovornosti

Čagalj, M. ; Čapkun, S. ; Rengaswamy, R. ; Tsigkogiannis, I. ; Srivastava, M. ; Hubaux, J.-P.

engleski

Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels

Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit 0 into a bit 1, but not the contrary), we propose integrity codes (I--codes) for a radio communication channel, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material (i.e. public keys or shared secret keys). The construction of I--codes enables a sender to encode any message such that if its integrity is violated in transmission over a radio channel, the receiver is able to detect it. In order to achieve this, we rely on the physical properties of the radio channel. We analyze in detail the use of I--codes on a radio communication channel and we present their implementation on a Mica2 wireless sensor platform as a "proof of concept". We finally introduce a novel concept called "authentication through presence" that can be used for several applications, including for key establishment and for broadcast authentication over an insecure radio channel. We perform a detailed analysis of the security of our coding scheme and we show that it is secure with respect to a realistic attacker model.

wireless security; authentication and integrity protection

Pozvan za objavu u casopisu IEEE Transactions on Dependable and Secure Computing (IEEE TDSC).

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

2006.

objavljeno

Podaci o matičnoj publikaciji

Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2006)

Podaci o skupu

IEEE Symposium on Security and Privacy

predavanje

21.05.2006-24.05.2006

Oakland (CA), Sjedinjene Američke Države

Povezanost rada

Računarstvo

Poveznice