Abstract

In smart grid, sensor measurements are often sent to a control node over a hop–by–hop network of sensors themselves. To prevent en route accidental and malicious data corruption, each message is authenticated with a MAC, keyed with a symmetric key known to the generating sensor and the control node. MACs represent a significant overhead: a typical 128–bit MAC may often authenticate a 10–bit temperature reading. To mitigate these overheads, MAC aggregation methods were proposed. However, previously proposed MAC aggregation schemes are not resilient to Denial–of–Service (DoS) attacks, where a rogue node or a man–in–the–middle attacker can easily disrupt the entire set of MACs, and hence prevent using any of the transmitted data. In this work we propose a new way of MAC aggregation, which will allow the relay sensors to greatly reduce transmission overhead due to MACs, while achieving full unforgeability, and, simultaneously, much stronger resilience to DoS attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.