Secure Broadcast Communication: In Wired and Wireless - download pdf or read online

By Adrian Perrig

ISBN-10: 1461349761

ISBN-13: 9781461349761

ISBN-10: 1461502292

ISBN-13: 9781461502296

Secure Broadcast conversation in stressed and instant Networks offers a suite of basic protocols for development safe info distribution platforms. functions comprise instant broadcast, IP multicast, sensor networks and webs, advert hoc networks, and satellite tv for pc broadcast. This ebook provides and compares new suggestions for easy operations together with:
*key distribution for entry keep watch over,
*source authentication of transmissions, and
*non-repudiation of streams.

This ebook discusses tips to observe those operations either with excessive functionality processors and source restricted processors. It exhibits tips on how to guard opposed to adversaries who inject packets or eavesdrop. the point of interest is on practical descriptions instead of theoretical discussions. Protocols are awarded as simple construction blocks that may be mixed with one another and standard protection protocols. The booklet illustrates those protocols in perform by way of providing a true implementation that gives safeguard for an advert hoc sensor community.

This e-book can function a textbook or supplementary interpreting in graduate point classes on protection or networking, or can be utilized for self learn.

Show description

Read Online or Download Secure Broadcast Communication: In Wired and Wireless Networks PDF

Similar networks books

The All-New Switch Book: The Complete Guide to LAN Switching - download pdf or read online

This much-needed replace to the bestselling advisor at the large adjustments to the neighborhood zone networks (LAN) switching applied sciences explains why LAN switching applied sciences are serious to community layout.

This in-depth advisor covers the services, program, and layout of LAN switches and switched internetworks and examines the numerous alterations that experience taken position because the e-book of the 1st version seven years in the past.

You're certain to enjoy the witty writing sort and easy-to-follow structure on such an often-complicated material.

Frank Ohrtman's WiMAX Handbook PDF

Wi-MAX is a huge deal simply because it’s more affordable, smaller, less complicated and more uncomplicated to take advantage of than any latest broadband choice (DSL, cable, fiber, 3G instant) – it additionally bypasses the present stressed out infrastructure and legacy carrier prone (i. e. the telephone and cable companies). This ebook offers a easy technical advent to the IEEE normal, permitting engineers, technologists, and decision-makers to check how this highly disruptive know-how goes to impact their companies.

Intelligent Control Based on Flexible Neural Networks - download pdf or read online

References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . fifty seven bankruptcy three versatile Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . sixty one three. 1 advent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

New PDF release: Networks of Learning Automata: Techniques for Online

Networks of studying Automata: concepts for on-line Stochastic Optimization is a entire account of studying automata types with emphasis on multiautomata structures. It considers synthesis of complicated studying constructions from uncomplicated construction blocks and makes use of stochastic algorithms for refining possibilities of identifying activities.

Extra resources for Secure Broadcast Communication: In Wired and Wireless Networks

Sample text

This chapter presents TESLA. The TESLA protocol meets all of the above requirements with low cost - but it has the following special requirements: • The sender and the receivers must be at least loosely time-synchronized. • Either the receiver or the sender must buffer some messages. Despite the buffering, TESLA has a very low authentication delay. In typical configurations, the authentication delay is on the order of one round-trip delay between the sender and receiver. In the next section, we present the basic TESLA protocol, and later sections present further enhancements.

A receiver who wants to ensure that messages originate from the claimed sender, can verify message authenticity by: 1) sharing a secret key with the sender; 2) the sender adds an authentication tag (or MAC) computed with the shared key to every message it sends; 3) the receiver computes the MAC function using the shared key to verify that the authentication tag is correct. Because the same key is shared between the sender and the receiver, this is also a type of symmetric cryptography. A secure MAC function prevents an attacker (without knowledge of the secret key) from computing the correct MAC for a new message.

R --+ S : Nonce S --+ R: {Sender time ts, Nonce} K-1 5 To verify the return message, the receiver verifies the digital signature and checks that the nonce in the packet equals the nonce it randomly generated. If the message is authentic, the receiver stores tR and ts. To compute the upper bound on the sender's clock at local time t, the receiver computes t - tR + ts. 3: Simple time synchronization protocol. delay of the time synchronization request packet, so it must assume that the time synchronization error is D..

Download PDF sample

Secure Broadcast Communication: In Wired and Wireless Networks by Adrian Perrig

by Daniel

Rated 4.83 of 5 – based on 16 votes