Survey on Real Time Broadcast Authentication Schemes for Command and Control Messages

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
"A broadcast authentication protocol enables the receivers to verify that a received packet was really sent by the claimed sender. Data confidentiality, authenticity, integrity, and non repudiation are basic concerns of securing data delivery over an insecure network. Large and distributed systems with time critical applications require immediate and secure authentication of command and control messages to work efficiently. This paper compare various message authentication schemes like symmetric, asymmetric cryptographic methods, delayed key disclosure methods, signature amortization techniques, one time signatures, online-offline signatures and rapid authentication scheme."
Download Now

Find By Topic