Proceedings of the Second ACM Conference on Wireless Network Security 2009
DOI: 10.1145/1514274.1514297
|View full text |Cite
|
Sign up to set email alerts
|

A coding-theoretic approach for efficient message verification over insecure channels

Abstract: We address the problem of allowing authorized users, who have yet to establish a secret key, to securely and efficiently exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. This problem was first introduced by Strasser, Pöp-per,Čapkun, andČagalj in their recent work, leaving joint consideration of security and efficiency as an open problem. In this paper, we present three approaches based on coding theory which reduce the overall time required … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(33 citation statements)
references
References 20 publications
0
33
0
Order By: Relevance
“…In addition to jamming-resistant broadcast, researchers have studied jamming-resistant schemes to setup a secret key between two nodes [16]- [18]. These schemes involve a lot of communication overhead and a long delay; they complement our scheme in this paper.…”
Section: Performance Analysismentioning
confidence: 99%
“…In addition to jamming-resistant broadcast, researchers have studied jamming-resistant schemes to setup a secret key between two nodes [16]- [18]. These schemes involve a lot of communication overhead and a long delay; they complement our scheme in this paper.…”
Section: Performance Analysismentioning
confidence: 99%
“…Recently, there is a series of promising research efforts on anti-jamming communication without pre-shared keys, including UFH [3], [10], [14], [15], UDSSS [9], [13], [16], and BBC [4].…”
Section: Related Workmentioning
confidence: 99%
“…In BMA, the erasure coding combined with a one-way authenticator based on bilinear maps can also efficiently address false data injection attacks by jammers. Some additional efficient packet verification methods were proposed in [14].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations