Back to Search Start Over

Message Authentication in Computationally Constrained Environments.

Authors :
Arazi, Benjamin
Source :
IEEE Transactions on Mobile Computing; Jul2009, Vol. 8 Issue 7, p968-974, 7p, 1 Black and White Photograph, 5 Diagrams
Publication Year :
2009

Abstract

RFID and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by Hash Message Authentication Codes (HMAC). As clearly stated in the literature, current approved implementations of HMAC require resources that cannot be supported in constrained components. An approach to implement a compact HMAC by the use of stream ciphering is presented in this paper. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15361233
Volume :
8
Issue :
7
Database :
Complementary Index
Journal :
IEEE Transactions on Mobile Computing
Publication Type :
Academic Journal
Accession number :
41988529
Full Text :
https://doi.org/10.1109/TMC.2009.40