Download now Free registration required
There are several protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise rely on the presence of an auxiliary device. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by Dynamic Message Authentication Codes (DMAC). As clearly stated in the literature, current approved implementations of DMAC require resources that cannot be supported in constrained components. An approach to implement a compact DMAC by the use of stream ciphering is presented in this paper.
- Format: PDF
- Size: 298 KB