Article ID Journal Published Year Pages File Type
444382 Ad Hoc Networks 2015 29 Pages PDF
Abstract

With the increase in the usage of wireless networks and their applications where broadcast transmission is widely used, it has become critical to authenticate broadcast messages. Several broadcast authentication techniques are currently available. However, no scheme is ideal for all broadcast transmission applications. Our goal is to classify, compare and analyze existing broadcast authentication techniques to enable designers to select an appropriate technique that suits their system, computation, communication and application requirements. Furthermore, this study provides better understanding of the research challenges that are still not addressed or only partially addressed.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,