Secure Broadcast Communication: In Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental prools for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:

*key distribution for access control,

*source authentication of transmissions, and

*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Prools are presented as basic building blocks that can be combined with each other and traditional security prools. The book illustrates these prools in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

1106863580
Secure Broadcast Communication: In Wired and Wireless Networks
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental prools for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:

*key distribution for access control,

*source authentication of transmissions, and

*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Prools are presented as basic building blocks that can be combined with each other and traditional security prools. The book illustrates these prools in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

109.99 In Stock
Secure Broadcast Communication: In Wired and Wireless Networks

Secure Broadcast Communication: In Wired and Wireless Networks

by Adrian Perrig, J.D. Tygar
Secure Broadcast Communication: In Wired and Wireless Networks

Secure Broadcast Communication: In Wired and Wireless Networks

by Adrian Perrig, J.D. Tygar

Hardcover(2003)

$109.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental prools for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:

*key distribution for access control,

*source authentication of transmissions, and

*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Prools are presented as basic building blocks that can be combined with each other and traditional security prools. The book illustrates these prools in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.


Product Details

ISBN-13: 9780792376507
Publisher: Springer US
Publication date: 11/30/2002
Edition description: 2003
Pages: 214
Product dimensions: 6.10(w) x 9.25(h) x 0.36(d)

Table of Contents

1. Introduction.- 1.1 Challenges of Broadcast Communication.- 1.2 Why is Security for Broadcasts Hard?.- 1.3 Security Requirements for Broadcast Applications.- 1.4 Novel Contributions.- 1.5 Scope of this Book.- 1.6 Book Overview.- 2. Cryptographic Fundamentals.- 2.1 Broadcast Network Requirements.- 2.2 Cryptographic Primitives.- 2.3 Efficiency of Cryptographic Primitives.- 2.4 Commitment Prools.- 3. Tesla Broadcast Authentication.- 3.1 Requirements for Broadcast Authentication.- 3.2 The Basic TESLA Prool.- 3.3 TIK: TESLA with Instant Key Disclosure.- 3.4 Time Synchronization.- 3.5 Variations.- 3.6 Denial-of-Service Protection.- 4. Biba Broadcast Authentication.- 4.1 The BiBa Signature Algorithm.- 4.2 The BiBa Broadcast Authentication Prool.- 4.3 BiBa Broadcast Prool Extensions.- 4.4 Practical Considerations.- 4.5 Variations and Extensions.- 4.6 One-Round BiBa is as secure as Multi-Round BiBa.- 4.7 Merkle Hash Trees for Ball Authentication.- 5. Emss, Mess, & Htss: Signatures for Broadcast.- 5.1 Efficient Multicast Stream Signature (EMSS).- 5.2 MESS.- 5.3 Variations.- 5.4 HTSS.- 6. Elk Key Distrubution.- 6.1 Introduction.- 6.2 Review of the LKH Key Distribution Prool.- 6.3 Review of the OFT Key Distribution Prool.- 6.4 Reliability for Key Update Messages.- 6.5 Four Basic Techniques.- 6.6 ELK: Efficient Large-Group Key Distribution.- 6.7 Applications and Practical Issues.- 6.8 Appendix.- 7. Sensor Network Security.- 7.1 Background.- 7.2 System Assumptions.- 7.3 Requirements for Sensor Network Security.- 7.4 Additional Notation.- 7.5 SNEP and µTESLA.- 7.6 Implementation.- 7.7 Evaluation.- 7.8 Application of SNEP: Node-to-Node Key Agreement.- 8. Related Work.- 8.1 General Broadcast Security.- 8.2 Broadcast Authentication.- 8.3 Broadcast Signature.- 8.4Digital Signatures Based on One-way Functions without Trapdoors.- 8.5 Small-Group Key Agreement.- 8.6 Large-Group Key Distribution.- 9. Conclusion.- 9.1 Open Problems.- 10. Glossary.
From the B&N Reads Blog

Customer Reviews