TY - GEN
T1 - PEAC: A probabilistic, efficient, and resilient authentication protocol for broadcast communications
AU - Cirulli, Andrea
AU - Pietro, Roberto Di
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2008/12/1
Y1 - 2008/12/1
N2 - One of the main challenges of securing broadcast communications is source authentication: to allow each receiver to verify the origin of the data. An ideal broadcast authentication protocol should be efficient for the sender and the receiver, have a small communication overhead, allow the receiver to authenticate each individual packet as soon as it is received (i.e. no buffering on the receivers), provide perfect robustness to packet loss, and scale to a large number of receivers. In this paper we introduce PEAC, a probabilistic, efficient and resilient authentication protocol for broadcast communications. This new construction achieves all the above properties, with the tradeoff that it requires just loose time synchronization between the sender and the receivers. Due to its low communication overhead and minimal synchronization requirements, the scheme is particularly suitable for low-end resource constrained devices as well as applications that require to process the received messages in real time or quasi-real time fashion. For instance, a packet can be authenticated computing 12 hash only on both the sender and the receivers, while the packet forging probability is kept below 2 -80. Finally, note that PEAC is completely customizable, allowing to trade-off security with a (small) overhead increase on the sender only, while not affecting the (small) overhead experienced by receivers. Copyright 2008 ACM.
AB - One of the main challenges of securing broadcast communications is source authentication: to allow each receiver to verify the origin of the data. An ideal broadcast authentication protocol should be efficient for the sender and the receiver, have a small communication overhead, allow the receiver to authenticate each individual packet as soon as it is received (i.e. no buffering on the receivers), provide perfect robustness to packet loss, and scale to a large number of receivers. In this paper we introduce PEAC, a probabilistic, efficient and resilient authentication protocol for broadcast communications. This new construction achieves all the above properties, with the tradeoff that it requires just loose time synchronization between the sender and the receivers. Due to its low communication overhead and minimal synchronization requirements, the scheme is particularly suitable for low-end resource constrained devices as well as applications that require to process the received messages in real time or quasi-real time fashion. For instance, a packet can be authenticated computing 12 hash only on both the sender and the receivers, while the packet forging probability is kept below 2 -80. Finally, note that PEAC is completely customizable, allowing to trade-off security with a (small) overhead increase on the sender only, while not affecting the (small) overhead experienced by receivers. Copyright 2008 ACM.
UR - https://dl.acm.org/doi/10.1145/1460877.1460915
UR - http://www.scopus.com/inward/record.url?scp=70249112677&partnerID=8YFLogxK
U2 - 10.1145/1460877.1460915
DO - 10.1145/1460877.1460915
M3 - Conference contribution
SN - 9781605582412
BT - Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
ER -