Message authentication in computationally constrained environments

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

RFID and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by Hash Message Authentication Codes (HMAC). As clearly stated in the literature, current approved implementations of HMAC require resources that cannot be supported in constrained components. An approach to implement a compact HMAC by the use of stream ciphering is presented in this paper.

Original languageEnglish
Article number4785468
Pages (from-to)968-974
Number of pages7
JournalIEEE Transactions on Mobile Computing
Volume8
Issue number7
DOIs
StatePublished - 1 Jul 2009
Externally publishedYes

Keywords

  • Challenge response
  • Constrained environments
  • HMAC
  • Secured communications
  • Stream ciphers

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Message authentication in computationally constrained environments'. Together they form a unique fingerprint.

Cite this