|Abstract:||In this work, the threats to TESLA and the TESLA keychain are evaluated and the weak points in the implementation are identified. Modes of attack are modeled to emulate the effort required for an attacker to break the security of the TESLA keychain. This effort is contextualized with the window of vulnerability which is directly related to the length of the keychain and other variables. The effort required to break TESLA as these variables change is calculated using probabilistic models. While observing the variables’ consequences to security, an analysis is carried out that yield recommendations for a secure implementation of the TESLA keychain.|
Proceedings of the 31st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2018)
September 24 - 28, 2018
Hyatt Regency Miami
|Pages:||2155 - 2171|
|Cite this article:||
Neish, Andrew, Walter, Todd, Enge, Per, "Parameter Selection for the TESLA Keychain," Proceedings of the 31st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2018), Miami, Florida, September 2018, pp. 2155-2171.
ION Members/Non-Members: 1 Download Credit