dos attack tolerant tesla based broadcast authentication protocol in internet of things n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things PowerPoint Presentation
Download Presentation
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things

Loading in 2 Seconds...

play fullscreen
1 / 15

DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things - PowerPoint PPT Presentation


  • 98 Views
  • Uploaded on

DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things. Author : Na Ruan , Yoshiaki Hori Published in: 2012 International Conference on Selected Topics in Mobile and Wireless Networking Presented : 102064506 劉立恆. O utline. Introduction

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things' - lewis


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
dos attack tolerant tesla based broadcast authentication protocol in internet of things

DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things

Author:

Na Ruan, Yoshiaki Hori

Published in:

2012 International Conference on Selected Topics in Mobile and Wireless Networking

Presented: 102064506 劉立恆

o utline

Outline

Introduction

WSN, VANET

DOS

TESLA protocol

Original TESLA

TESLA++

µTESLA

Reviseprotocol

Performance analysis

wsn w ireless sensor network
WSN(Wireless Sensor Network)
  • Limitation of memory
  • Limitation of computation power
  • Limitation of power consumption
revised protocol
Revised Protocol
  • Resisting of both computational and memory-based DoS attack.
  • Low complexity
slide7
DOS
  • Memory based
  • Computation based
tesla timed efficient stream loss tolerant authentication
TESLA (Timed Efficient Stream Loss-tolerant Authentication)

Hash function f(Ki, M)

tesla
TESLA++

查表

tesla1
µTESLA
  • All packets sent within one time interval are authenticated with the same key.
  • Disclosed delay
    • ex: 2 time intervals
  • F(Ki)=Ki-1
revised protocol1
Revised protocol
  • Store MAC instead of Message(same as TESLA++)
  • Two-level key chain
comparison
Comparison
  • Tolerate bothcomputational and memory-based DoS attack with low energyconsumption
performance1
Performance
  • Left
    • Relationship between Ba and Bd for P=0.9
  • Right
    • Relationship between Ba and m for P=0.9
drawback
Drawback
  • Computational DoS free ?
  • Lack of experiments
  • Abetter algorithm ?