next up previous
Next: Related Work Up: DoS Attack on the Previous: DoS on the Packet

DoS on the Key Chain

Another DoS attack is specific to how the TESLA receiver reconstructs the key chain. If an attacker could fool a receiver to believe that a packet was sent out far in the future, and the receiver would try to verify the key disclosed in the packet by applying the pseudo-random function until the last committed key chain value. This attack can be easily prevented by checking that the packet interval is less or equal the latest interval that the sender can possibly be in. For an incoming packet sent in interval Ij, the receiver can verify if the interval Ij is not in the future, i.e. if the sender can already be in that interval. The verification condition is that Ij < (ti - T0) / Tint , where ti is an upper bound on the sender's time that the receiver computes at the arrival of the packet.


next up previous
Next: Related Work Up: DoS Attack on the Previous: DoS on the Packet

Adrian Perrig
Sun Nov 5 19:29:44 PST 2000