Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
444382 | Ad Hoc Networks | 2015 | 29 Pages |
Abstract
With the increase in the usage of wireless networks and their applications where broadcast transmission is widely used, it has become critical to authenticate broadcast messages. Several broadcast authentication techniques are currently available. However, no scheme is ideal for all broadcast transmission applications. Our goal is to classify, compare and analyze existing broadcast authentication techniques to enable designers to select an appropriate technique that suits their system, computation, communication and application requirements. Furthermore, this study provides better understanding of the research challenges that are still not addressed or only partially addressed.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Kanika Grover, Alvin Lim,