2022
DOI: 10.1109/access.2022.3152895
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication

Abstract: This study discusses the general overview of Timed Efficient Stream Loss-tolerant Authentication (TESLA) protocol, including its properties, key setups, and improvement protocols. The discussion includes a new proposed two-level infinite µTESLA (TLI µTESLA) protocol that solves the authentication delay and synchronization issues. We theoretically compared TLI µTESLA with the previously proposed protocols in terms of security services and showed that the new protocol prevents excessive use of the buffer in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…Some authors like Eledlebi, Khouloud et al demonstrated the use of symmetric key encryption for the secure communication of biometric templates and employed a one-way hash function to ensure the integrity of the messages being communicated. 39 Some authors, like Shabaz et al 19 developed an approach including two-factor authentication or 2FA step verification for all external services to overcome the MITM attack. Additionally, client credentials are safeguarded with double encryption to prevent MITM attacks.…”
Section: Mechanisms To Prevent Mitm Attacksmentioning
confidence: 99%
“…Some authors like Eledlebi, Khouloud et al demonstrated the use of symmetric key encryption for the secure communication of biometric templates and employed a one-way hash function to ensure the integrity of the messages being communicated. 39 Some authors, like Shabaz et al 19 developed an approach including two-factor authentication or 2FA step verification for all external services to overcome the MITM attack. Additionally, client credentials are safeguarded with double encryption to prevent MITM attacks.…”
Section: Mechanisms To Prevent Mitm Attacksmentioning
confidence: 99%
“…Table I in section VI summarizes the advantages and disadvantages of the previously discussed variant TESLA protocols, and the proposed Enhanced Inf-TESLA protocol that is discussed later in section IV. A more detailed explanation of the security properties provided by these protocols can be found in [16].…”
Section: Related Workmentioning
confidence: 99%
“…This section discusses the latest variants of TESLA protocols that are used to compare our proposed Hybrid TLI-µTESLA protocol with. A detailed explanation about all the variants is given in [ 18 ].…”
Section: Related Workmentioning
confidence: 99%