Accepted author manuscript, 614 KB, PDF document
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Implementation and Evaluation of Distance-Based Message Authentication
AU - Chung, Antony
AU - Roedig, Utz
PY - 2010/11
Y1 - 2010/11
N2 - A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper we present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs using Nanotron NA5TR1 transceivers. We show that DBMA can be used to reject messages sent from outside a secure (trusted) area. With DBMA, messages can be authenticated without involving costly cryptographic algorithms. The DBMA implementation is evaluated in two different deployment scenarios. Distance measurement errors and their impact on the size of the required secure area are evaluated. Furthermore, we present methods to reduce the size of the required secure area.
AB - A new generation of WSN communication transceivers are now available that support time-of-flight distance measurement. This measurement can be inseparably integrated with message transmission making it possible to authenticate messages based on distance. In this paper we present a practical implementation of Distance Based Message Authentication (DBMA) for WSNs using Nanotron NA5TR1 transceivers. We show that DBMA can be used to reject messages sent from outside a secure (trusted) area. With DBMA, messages can be authenticated without involving costly cryptographic algorithms. The DBMA implementation is evaluated in two different deployment scenarios. Distance measurement errors and their impact on the size of the required secure area are evaluated. Furthermore, we present methods to reduce the size of the required secure area.
U2 - 10.1109/MASS.2010.5663905
DO - 10.1109/MASS.2010.5663905
M3 - Conference contribution/Paper
SN - 9781424474882
SP - 519
EP - 524
BT - IEEE 7th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2010
PB - IEEE
T2 - Proceedings of the 6th IEEE International Workshop on Wireless and Sensor Networks Security (WSNS2010) at IEEE MASS 2010, San Francisco, USA
Y2 - 1 January 1900
ER -