Pregled bibliografske jedinice broj: 259828
Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels
Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels // Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2006)
Oakland (CA), Sjedinjene Američke Države, 2006. (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 259828 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Integrity (I) codes: Message Integrity Protection and Authentication over Insecure Channels
Autori
Čagalj, M. ; Čapkun, S. ; Rengaswamy, R. ; Tsigkogiannis, I. ; Srivastava, M. ; Hubaux, J.-P.
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P 2006)
/ - , 2006
Skup
IEEE Symposium on Security and Privacy
Mjesto i datum
Oakland (CA), Sjedinjene Američke Države, 21.05.2006. - 24.05.2006
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
wireless security; authentication and integrity protection
Sažetak
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit 0 into a bit 1, but not the contrary), we propose integrity codes (I--codes) for a radio communication channel, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material (i.e. public keys or shared secret keys). The construction of I--codes enables a sender to encode any message such that if its integrity is violated in transmission over a radio channel, the receiver is able to detect it. In order to achieve this, we rely on the physical properties of the radio channel. We analyze in detail the use of I--codes on a radio communication channel and we present their implementation on a Mica2 wireless sensor platform as a "proof of concept". We finally introduce a novel concept called "authentication through presence" that can be used for several applications, including for key establishment and for broadcast authentication over an insecure radio channel. We perform a detailed analysis of the security of our coding scheme and we show that it is secure with respect to a realistic attacker model.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo
Napomena
Pozvan za objavu u casopisu IEEE Transactions on Dependable and Secure Computing (IEEE TDSC).
POVEZANOST RADA
Ustanove:
Fakultet elektrotehnike, strojarstva i brodogradnje, Split
Profili:
Mario Čagalj
(autor)