科技报告详细信息
Low-bandwidth authentication. | |
Donnelly, Patrick Joseph ; McIver, Lauren ; Gaines, Brian R. ; Anderson, Erik ; Collins, Michael Joseph ; Thomas,Kurt Adam ; McDaniel, Austin | |
关键词: ALGORITHMS; SENSORS; DATA ACQUISITION SYSTEMS; DATA TRANSMISSION; POWER RANGE; VULNERABILITY; SECURITY; VALIDATION; CRYPTOGRAPHY Authentication.; Nanotechnology.; Sensor networ; | |
DOI : 10.2172/920442 RP-ID : SAND2007-5991 PID : OSTI ID: 920442 Others : TRN: US200818%%15 |
|
学科分类:社会科学、人文和艺术(综合) | |
美国|英语 | |
来源: SciTech Connect | |
![]() |
【 摘 要 】
Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO201705190000988LZ | 261KB | ![]() |