The TESLA Broadcast Authentication Protocol

  • Perrig A
  • Canetti R
  • Tygar J
  • et al.
N/ACitations
Citations of this article
175Readers
Mendeley users who have this article in their library.

Abstract

One of the main challenges of securing broad-cast communication is source authentication, or enabling receivers of broadcast data to verify that the received data really originates from the claimed source and was not modified en route. This problem is complicated by mutually un-trusted receivers and unreliable communication environments where the sender does not retrans-mit lost packets. This article presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol, an efficient protocol with low communication and computa-tion overhead, which scales to large numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Despite using purely symmetric cryptographic functions (MAC functions), TESLA achieves asymmetric properties. We discuss a PKI appli-cation based purely on TESLA, assuming that all network nodes are loosely time synchronized.

Cite

CITATION STYLE

APA

Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2002). The TESLA Broadcast Authentication Protocol. RSA CryptoBytes Technical Newsletter, 5(2), 2–13. Retrieved from http://www.cs.berkeley.edu/~tygar/papers/TESLA_broadcast_authentication_protocol.pdf

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free