Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: IResearch Article Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2011 Article ID 392529 18 pages doi 10.1155 2011 392529 Research Article Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless Satellite Networks Ayan Roy-Chowdhury1 and John S. Baras2 1Institute for Systems Research University of Maryland College Park MD 20742 USA 2Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland College Park MD 20742 USA Correspondence should be addressed to Ayan Roy-Chowdhury ayan@umd.edu Received 1 June 2010 Revised 19 August 2010 Accepted 14 September 2010 Academic Editor Christos Verikoukis Copyright 2011 A. Roy-Chowdhury and J. S. Baras. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. We describe a new class of lightweight symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain keys from the chain are used for computing message authentication codes MACs on messages sourced by the device. The authentication protocol requires a centralized infrastructure in the network we describe the protocol in a hybrid wireless network with a satellite overlay interconnecting the wireless devices. The satellite is used as the Certificate Authority CA and also acts as the proxy for the senders in disclosing the MAC keys to the receivers. We also design a probabilistic nonrepudiation mechanism that utilizes the satellite s role as the CA and sender proxy. Through analysis we show that the authentication protocol is secure against malicious adversaries. We also present .