Authenticity in a reliable protocol for mobile computing

We consider a known protocol for reliable multicast in distributed mobile systems where mobile hosts communicate with a wired infrastructure by means of wireless technology. The original specification of the protocol does not take into consideration any notion of computer security: an adversary may eavesdrop on communications between hosts and inject packets over the wireless links. We suggest a secured version of the protocol providing authenticity and integrity of packets over the wireless links. The secure mechanisms introduced rely on two different techniques: secure wireless channels and 1-time signature schemes. Further, we outline the formal verification of part of the secured protocol.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[3]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[4]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[5]  Alberto Bartoli Group-based multicast and dynamic membership in wireless networks with incomplete spatial coverage , 1998, Mob. Networks Appl..

[6]  Gavin Lowe,et al.  Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.

[7]  Alberto Bartoli,et al.  Efficient Verification of a Multicast Protocol for Mobile Computing , 2001, Comput. J..

[8]  Myla Archer Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME , 2002 .

[9]  Cristina Videira Lopes,et al.  Aerial acoustic communications , 2001, Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575).

[10]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[11]  Giuseppe Anastasi,et al.  Group multicast in distributed mobile systems with unreliable wireless network , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[12]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[13]  Margery Eldridge,et al.  Satchel: providing access to any document, any time, anywhere , 2000, TCHI.

[14]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[15]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[16]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[17]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[18]  Fabio Martinelli,et al.  Analysis of security protocols as open systems , 2003, Theor. Comput. Sci..

[19]  Fabio Martinelli,et al.  Automated Analysis of Some Security Mechanisms of SCEP , 2002, ISC.

[20]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.