Parameter Selection For The Tesla Keychain

PROCEEDINGS OF THE 31ST INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2018)(2018)

引用 10|浏览1
暂无评分
摘要
In this work, the threats to TESLA and the TESLA keychain are evaluated and the weak points in the implementation are identified. Modes of attack are modeled to emulate the effort required for an attacker to break the security of the TESLA keychain. This effort is contextualized with the window of vulnerability which is directly related to the length of the keychain and other variables. The effort required to break TESLA as these variables change is calculated using probabilistic models. While observing the variables' consequences to security, an analysis is carried out that yield recommendations for a secure implementation of the TESLA keychain.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要