Message authentication for resource constrained devices is a challenging topic. Indeed, given the scarceness of on-board resources, solutions that do not rely on asymmetric key cryptography are in demand. A few solutions to address this issue have been proposed, and some have gained the status of state of the art thanks to their effectiveness and efficiency. However, even if state of the art solutions do provide sender-receiver on-the-fly message authentication, they are not able to tackle a few relevant attacks on received messages when the time dimension is taken into account. In particular, we first introduce two types of attacks: the switch command attack (where an adversary pretends to “switch” two messages over time-that is, altering the relative time ordering), and the drop command attack (where an adversary could pretend not having received a message previously sent from the legitimate sender). We then propose a new solution for broadcast authentication that copes with the above introduced attacks: MASS. Our analysis shows that MASS is effective in detecting both switch command and drop command attacks.

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices / Wafa Ben, Jaballah; Mauro, Conti; Roberto Di, Pietro; Mohamed, Mosbah; Verde, NINO VINCENZO. - STAMPA. - (2013), pp. 1-6. (Intervento presentato al convegno International Conference on Risks and Security of Internet and Systems (CRiSIS) tenutosi a La Rochelle, France nel October 23-25, 2013) [10.1109/CRiSIS.2013.6766350].

MASS: An efficient and secure broadcast authentication scheme for resource constrained devices

VERDE, NINO VINCENZO
2013

Abstract

Message authentication for resource constrained devices is a challenging topic. Indeed, given the scarceness of on-board resources, solutions that do not rely on asymmetric key cryptography are in demand. A few solutions to address this issue have been proposed, and some have gained the status of state of the art thanks to their effectiveness and efficiency. However, even if state of the art solutions do provide sender-receiver on-the-fly message authentication, they are not able to tackle a few relevant attacks on received messages when the time dimension is taken into account. In particular, we first introduce two types of attacks: the switch command attack (where an adversary pretends to “switch” two messages over time-that is, altering the relative time ordering), and the drop command attack (where an adversary could pretend not having received a message previously sent from the legitimate sender). We then propose a new solution for broadcast authentication that copes with the above introduced attacks: MASS. Our analysis shows that MASS is effective in detecting both switch command and drop command attacks.
2013
International Conference on Risks and Security of Internet and Systems (CRiSIS)
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
MASS: An efficient and secure broadcast authentication scheme for resource constrained devices / Wafa Ben, Jaballah; Mauro, Conti; Roberto Di, Pietro; Mohamed, Mosbah; Verde, NINO VINCENZO. - STAMPA. - (2013), pp. 1-6. (Intervento presentato al convegno International Conference on Risks and Security of Internet and Systems (CRiSIS) tenutosi a La Rochelle, France nel October 23-25, 2013) [10.1109/CRiSIS.2013.6766350].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/765861
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 0
social impact