Secured Initialization of Dynamic Message Authentication in Wireless Devices

There are several protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise rely on the presence of an auxiliary device. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by Dynamic Message Authentication Codes (DMAC). As clearly stated in the literature, current approved implementations of DMAC require resources that cannot be supported in constrained components. An approach to implement a compact DMAC by the use of stream ciphering is presented in this paper.

Provided by: International Journal on Computer Science and Technology (IJCST) Topic: Mobility Date Added: Sep 2011 Format: PDF

Download Now

Find By Topic