메뉴 건너뛰기




Volumn 9, Issue 10, 2014, Pages 1733-1742

An efficient real-time broadcast authentication scheme for command and control messages

Author keywords

applied cryptography; network security; Secure broadcast authentication; security of networked systems

Indexed keywords

APPLIED CRYPTOGRAPHY; BROADCAST AUTHENTICATION; COMMAND AND CONTROL; NETWORKED SYSTEMS; REAL-TIME BROADCAST;

EID: 84907450481     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2351255     Document Type: Article
Times cited : (36)

References (37)
  • 1
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • Nov.
    • K. Ren, W. Lou, K. Zeng, and P. J. Moran, "On broadcast authentication in wireless sensor networks, " IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136-4144, Nov. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 5
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
    • (2009) Proc. ACM Conf. Comput. Commun. Security , pp. 21-32
    • Liu, Y.1    Reiter, M.K.2    Ning, P.3
  • 6
    • 82155162323 scopus 로고    scopus 로고
    • UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
    • Dec.
    • H. Guo, Y. Wu, F. Bao, H. Chen, and M. Ma, "UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 707-714, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 707-714
    • Guo, H.1    Wu, Y.2    Bao, F.3    Chen, H.4    Ma, M.5
  • 7
    • 70349653420 scopus 로고    scopus 로고
    • Time valid onetime signature for time-critical multicast data authentication
    • Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, "Time valid onetime signature for time-critical multicast data authentication, " in Proc. IEEE INFOCOM, Apr. 2009, pp. 1233-1241.
    • (2009) Proc. IEEE INFOCOM, Apr. , pp. 1233-1241
    • Wang, Q.1    Khurana, H.2    Huang, Y.3    Nahrstedt, K.4
  • 8
    • 82155192847 scopus 로고    scopus 로고
    • Multicast authentication in the smart grid with onetime signature
    • Dec.
    • Q. Li and G. Cao, "Multicast authentication in the smart grid with onetime signature, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 686-696, Dec. 2011.
    • (2011) IEEE Trans. Smart Grid , vol.2 , Issue.4 , pp. 686-696
    • Li, Q.1    Cao, G.2
  • 9
    • 79951648231 scopus 로고    scopus 로고
    • Review and evaluation of security threats on the communication networks in the smart grid
    • Z. Lu, X. Lu, W. Wang, and C. Wang, "Review and evaluation of security threats on the communication networks in the smart grid, " in Proc. Military Commun. Conf. (MILCOM), Oct./Nov. 2010, pp. 1830-1835.
    • (2010) Proc. Military Commun. Conf. (MILCOM), Oct./Nov. , pp. 1830-1835
    • Lu, Z.1    Lu, X.2    Wang, W.3    Wang, C.4
  • 11
    • 84945118556 scopus 로고    scopus 로고
    • Lower bounds for multicast message authentication
    • [Online]
    • D. Boneh, G. Durfee, and M. K. Franklin, "Lower bounds for multicast message authentication, " in Proc. Int. Conf. Theory Appl. Cryptograph. Techn., 2001, pp. 437-452. [Online]. Available: http://dl.acm.org/citation.cfm?id=647086.715684
    • (2001) Proc. Int. Conf. Theory Appl. Cryptograph. Techn. , pp. 437-452
    • Boneh, D.1    Durfee, G.2    Franklin, M.K.3
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • Sep.
    • A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks, " Wireless Netw., vol. 8, no. 5, pp. 521-534, Sep. 2002.
    • (2002) Wireless Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 17
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • Aug.
    • C. K. Wong and S. S. Lam, "Digital signatures for flows and multicasts, " IEEE Trans. Netw., vol. 7, no. 4, pp. 502-513, Aug. 1999.
    • (1999) IEEE Trans. Netw. , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.K.1    Lam, S.S.2
  • 21
    • 0035752112 scopus 로고    scopus 로고
    • The BiBa one-time signature and broadcast authentication protocol
    • A. Perrig, "The BiBa one-time signature and broadcast authentication protocol, " in Proc. 8th ACM Conf. Comput. Commun. Security, Nov. 2001, pp. 28-37.
    • (2001) Proc. 8th ACM Conf. Comput. Commun. Security, Nov. , pp. 28-37
    • Perrig, A.1
  • 24
    • 3042690189 scopus 로고    scopus 로고
    • HORSE: An extension of an r-time signature scheme with fast signing and verification
    • Apr.
    • W. D. Neumann, "HORSE: An extension of an r-time signature scheme with fast signing and verification, " in Proc. Int. Conf. Inf. Technol., Coding Comput. (ITCC), vol. 2. Apr. 2004, pp. 129-134.
    • (2004) Proc. Int. Conf. Inf. Technol., Coding Comput. (ITCC) , vol.2 , pp. 129-134
    • Neumann, W.D.1
  • 30
    • 33845255980 scopus 로고    scopus 로고
    • HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryp-tion type key exchange schemes
    • A. A. Yavuz, F. Alagöz, and E. Anarim, "HIMUTSIS: Hierarchical multi-tier adaptive ad-hoc network security protocol based on signcryp-tion type key exchange schemes, " in Proc. 21th Int. Symp. Comput. Inf. Sci. (ISCIS), 2006, pp. 434-444.
    • (2006) Proc. 21th Int. Symp. Comput. Inf. Sci. (ISCIS) , pp. 434-444
    • Yavuz, A.A.1    Alagöz, F.2    Anarim, E.3
  • 31
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases, " ACM Trans. Storage, vol. 2, no. 2, pp. 107-138, 2006.
    • (2006) ACM Trans. Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 34
    • 41149145872 scopus 로고    scopus 로고
    • UCSD CSE Course, 1st ed. [Online]
    • M. Bellare and P. Rogaway, "Introduction to modern cryptography, " in UCSD CSE Course, 1st ed., 2005, p. 207, [Online]. Available: http://www.cs.ucsd.edu/∼mihir/cse207/classnotes.html
    • (2005) Introduction to Modern Cryptography , pp. 207
    • Bellare, M.1    Rogaway, P.2
  • 36
    • 85028913061 scopus 로고
    • Online/offline digital signatures
    • New York, NY, USA: Springer-Verlag
    • S. Even, O. Goldreich, and S. Micali, "Online/offline digital signatures, " in Advances in Cryptology. New York, NY, USA: Springer-Verlag, 1989, pp. 263-275.
    • (1989) Advances in Cryptology , pp. 263-275
    • Even, S.1    Goldreich, O.2    Micali, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.