Energy Oriented Vulnerability Analysis on Authentication Protocols for CPS
Modular exponentiation
Vulnerability
Handshake
Cyber-physical system
DOI:
10.1109/dcoss.2014.52
Publication Date:
2014-07-29T10:33:55Z
AUTHORS (2)
ABSTRACT
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool in password authentication protocols for cyber physical systems. We observe exponentiation to be an expensive operation terms of consumption addition known computationally intensive. then analyze security and advanced smart card based protocol systems, that use exponentiation. devise generic cryptanalysis method on protocol, which attacker exploits computational intensive nature perform denial service (DoS) attack. also show other similar vulnerable suggest methods prevent
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (15)
CITATIONS (4)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....