Securing TESLA Broadcast Protocol with Diffie-Hellman Key Exchange

Download Now
Provided by: International Association of Engineering and Management Education (IAEME)
Topic: Security
Format: PDF
The broadcast communication involves large scale spreading of data throughout the network. Some of the examples of them are satellite broadcast, IP multicast, wireless radio broadcast. There may be many unauthenticated users in the wireless network. To avoid them, the receiver has to ensure that the message it is receiving is from the original sender. An unknown user takes the identity of sender and injects broadcast packets. This phenomenon is known as packet injection attack.
Download Now

Find By Topic