Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security 2015
DOI: 10.1145/2732209.2732215
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Protection of Group Content Distribution

Abstract: Achieving security properties in distributed, hardware-limited, and unattended networks is a challenging task. This setting is challenging because an adversary can capture and physically compromise unattended nodes. In this setting, this paper presents one-way group communication protocols with strong security properties. In particular, how to send messages to a group of hardware-limited nodes with message secrecy and authenticity? We present several protocols and analyze them in terms of security, efficiency,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Note that in case of message block when i > i p r e +1, the receiving node in P can then request a state synchronization and obtain the necessary key information from BC via a unicast. The last part of the broadcast message is the encrypted group content ctext , which can be used associated with a message authentication code (MAC) to ensure authenticity . When the freshness checking as well as the verification of the MAC are correct, the receiver will accept the session message and update the local session number.…”
Section: Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…Note that in case of message block when i > i p r e +1, the receiving node in P can then request a state synchronization and obtain the necessary key information from BC via a unicast. The last part of the broadcast message is the encrypted group content ctext , which can be used associated with a message authentication code (MAC) to ensure authenticity . When the freshness checking as well as the verification of the MAC are correct, the receiver will accept the session message and update the local session number.…”
Section: Approachmentioning
confidence: 99%
“…Our dual evolution scheme includes a node‐key changing procedure. Similar key‐update mechanisms are introduced by Mauw et al and Szalachowski et al . Mauw's design is applied to a particular nodes‐to‐BC communication model, which is distinct from our network setting.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For each session, nodes in S i and the BC establish the shared session key S K i to protect messages in that session. Authentication and protection of the broadcast transmission are out of scope of this paper, as existing approaches can be applied . If the BC wants to add or remove nodes from the privileged set, it executes the protocol again for the next session i + 1.…”
Section: Approachmentioning
confidence: 99%
“…Szalachowski and Kotulski improve Schwenk's results by introducing a secure scheme in the face of node capture attacks . Their solution utilizes a hash‐chain‐based key update scheme and addresses security of the ciphertext transmission (from the BC to nodes), providing confidentiality, authentication, and weak freshness, and the security of such transmission is further studied .…”
Section: Related Workmentioning
confidence: 99%