Parameter Selection for the TESLA Keychain

Andrew Neish, Todd Walter, Per Enge

Abstract: In this work, the threats to TESLA and the TESLA keychain are evaluated and the weak points in the implementation are identified. Modes of attack are modeled to emulate the effort required for an attacker to break the security of the TESLA keychain. This effort is contextualized with the window of vulnerability which is directly related to the length of the keychain and other variables. The effort required to break TESLA as these variables change is calculated using probabilistic models. While observing the variables’ consequences to security, an analysis is carried out that yield recommendations for a secure implementation of the TESLA keychain.
Published in: Proceedings of the 31st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2018)
September 24 - 28, 2018
Hyatt Regency Miami
Miami, Florida
Pages: 2155 - 2171
Cite this article: Neish, Andrew, Walter, Todd, Enge, Per, "Parameter Selection for the TESLA Keychain," Proceedings of the 31st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2018), Miami, Florida, September 2018, pp. 2155-2171. https://doi.org/10.33012/2018.15852
Full Paper: ION Members/Non-Members: 1 Download Credit
Sign In