Low-bandwidth authentication [report]

Patrick Joseph Donnelly, Lauren McIver, Brian R. Gaines, Erik Anderson, Michael Joseph Collins, Kurt Adam Thomas, Austin McDaniel
2007 unpublished
Remotely-fielded unattended sensor networks generally must operate at very low power -in the milliwatt or microwatt range -and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and
more » ... e sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication
doi:10.2172/920442 fatcat:yyue7au3qfdslj25c763pv4o3q