Simulation of the Selected Networks Attack to the TESLA Authentication Protocol
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F09%3A00160577" target="_blank" >RIV/68407700:21230/09:00160577 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Simulation of the Selected Networks Attack to the TESLA Authentication Protocol
Original language description
This paper deals with the task of simulation the broadcast authentication protocols using Colored Petri Nets. CPN is a special instance of orientated graph that enables to describe data flows and information dependencies inside of modeled systems. Protocol TESLA (Time Efficient Stream Loss-tolerant Authentication) was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a functional model of the protocol. Broadcast authentication protocols can be used in many situations where is one transmitter and multiple recipients such as message exchange in sensor networks routing protocols, or the process of leader election in sensors networks.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
JA - Electronics and optoelectronics
OECD FORD branch
—
Result continuities
Project
—
Continuities
Z - Vyzkumny zamer (s odkazem do CEZ)
Others
Publication year
2009
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Digital Technologies 2009
ISBN
978-80-554-0150-8
ISSN
—
e-ISSN
—
Number of pages
2
Pages from-to
—
Publisher name
TU v Žilině
Place of publication
Žilina
Event location
Žilina
Event date
Nov 12, 2009
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—