Front cover image for Secure broadcast communication in wired and wireless networks

Secure broadcast communication in wired and wireless networks

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.
eBook, English, ©2003
Kluwer Academic Publishers, Boston, ©2003
1 online resource
9780792376507, 0792376501
1012474169
1. Introduction.- 1.1 Challenges of Broadcast Communication.- 1.2 Why is Security for Broadcasts Hard?.- 1.3 Security Requirements for Broadcast Applications.- 1.4 Novel Contributions.- 1.5 Scope of this Book.- 1.6 Book Overview.- 2. Cryptographic Fundamentals.- 2.1 Broadcast Network Requirements.- 2.2 Cryptographic Primitives.- 2.3 Efficiency of Cryptographic Primitives.- 2.4 Commitment Protocols.- 3. Tesla Broadcast Authentication.- 3.1 Requirements for Broadcast Authentication.- 3.2 The Basic TESLA Protocol.- 3.3 TIK: TESLA with Instant Key Disclosure.- 3.4 Time Synchronization.- 3.5 Variations.- 3.6 Denial-of-Service Protection.- 4. Biba Broadcast Authentication.- 4.1 The BiBa Signature Algorithm.- 4.2 The BiBa Broadcast Authentication Protocol.- 4.3 BiBa Broadcast Protocol Extensions.- 4.4 Practical Considerations.- 4.5 Variations and Extensions.- 4.6 One-Round BiBa is as secure as Multi-Round BiBa.- 4.7 Merkle Hash Trees for Ball Authentication.- 5. Emss, Mess, & Htss: Signatures for Broadcast.- 5.1 Efficient Multicast Stream Signature (EMSS).- 5.2 MESS.- 5.3 Variations.- 5.4 HTSS.- 6. Elk Key Distrubution.- 6.1 Introduction.- 6.2 Review of the LKH Key Distribution Protocol.- 6.3 Review of the OFT Key Distribution Protocol.- 6.4 Reliability for Key Update Messages.- 6.5 Four Basic Techniques.- 6.6 ELK: Efficient Large-Group Key Distribution.- 6.7 Applications and Practical Issues.- 6.8 Appendix.- 7. Sensor Network Security.- 7.1 Background.- 7.2 System Assumptions.- 7.3 Requirements for Sensor Network Security.- 7.4 Additional Notation.- 7.5 SNEP and µTESLA.- 7.6 Implementation.- 7.7 Evaluation.- 7.8 Application of SNEP: Node-to-Node Key Agreement.- 8. Related Work.- 8.1 General Broadcast Security.- 8.2 Broadcast Authentication.- 8.3 Broadcast Signature.- 8.4Digital Signatures Based on One-way Functions without Trapdoors.- 8.5 Small-Group Key Agreement.- 8.6 Large-Group Key Distribution.- 9. Conclusion.- 9.1 Open Problems.- 10. Glossary.