Pregled bibliografske jedinice broj: 317473
Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels // IEEE Transactions on Dependable and Secure Computing, 5 (2008), 4; 208-223 doi:10.1109/TDSC.2008.11 (međunarodna recenzija, članak, znanstveni)
CROSBI ID: 317473 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Integrity Codes: Message Integrity Protection and Authentication Over Insecure Channels
Autori
Čapkun, Srđan ; Čagalj, Mario ; Rengaswamy, Ramkumar ; Tsigkogiannis, Ilias ; Hubaux, Jean-Pierre ; Srivastava, Mani
Izvornik
IEEE Transactions on Dependable and Secure Computing (1545-5971) 5
(2008), 4;
208-223
Vrsta, podvrsta i kategorija rada
Radovi u časopisima, članak, znanstveni
Ključne riječi
Wireless security; message authentication; user-friendliness
Sažetak
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit "0" into a bit "1", but not the contrary), we propose integrity codes (I-codes) for a radio communication channel, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material (i.e. public keys or shared secret keys). The construction of I-codes enables a sender to encode any message such that if its integrity is violated in transmission over a radio channel, the receiver is able to detect it. In order to achieve this, we rely on the physical properties of the radio channel and on unidirectional error detecting codes. We analyze in detail the use of I-codes on a radio communication channel and we present their implementation on a wireless platform as a "proof of concept".We further introduce a novel concept called "authentication through presence", whose broad applications including broadcast authentication, key establishment and navigation signal protection. We perform a detailed analysis of the security of our coding scheme and we show that it is secure within a realistic attacker model.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo
POVEZANOST RADA
Projekti:
023-0231924-1660 - NAPREDNE HETEROGENE MREŽNE TEHNOLOGIJE (Begušić, Dinko, MZOS ) ( CroRIS)
Ustanove:
Fakultet elektrotehnike, strojarstva i brodogradnje, Split
Profili:
Mario Čagalj
(autor)
Citiraj ovu publikaciju:
Časopis indeksira:
- Current Contents Connect (CCC)
- Web of Science Core Collection (WoSCC)
- Science Citation Index Expanded (SCI-EXP)
- SCI-EXP, SSCI i/ili A&HCI
- Scopus