科技报告详细信息
Low-bandwidth authentication.
Donnelly, Patrick Joseph ; McIver, Lauren ; Gaines, Brian R. ; Anderson, Erik ; Collins, Michael Joseph ; Thomas,Kurt Adam ; McDaniel, Austin
关键词: ALGORITHMS;    SENSORS;    DATA ACQUISITION SYSTEMS;    DATA TRANSMISSION;    POWER RANGE;    VULNERABILITY;    SECURITY;    VALIDATION;    CRYPTOGRAPHY Authentication.;    Nanotechnology.;    Sensor networ;   
DOI  :  10.2172/920442
RP-ID  :  SAND2007-5991
PID  :  OSTI ID: 920442
Others  :  TRN: US200818%%15
学科分类:社会科学、人文和艺术(综合)
美国|英语
来源: SciTech Connect
PDF
【 摘 要 】
Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.
【 预 览 】
附件列表
Files Size Format View
RO201705190000988LZ 261KB PDF download
  文献评价指标  
  下载次数:1次 浏览次数:12次