DATA TRANSMISSION AUTHENTICATION TECHNIQUES FOR USE IN UNATTENDED SURVEILLANCE SYSTEMS

Year
1989
Author(s)
Charles S. Johnson - Sandia National Laboratories
Abstract
The development of more complex and distributed unattended surveillance systems has created the need to be able to send data over a variety of transmission mediums and authenticate the data on its arrival. Techniques centering around the use of large programmable read-only-memories (PROM) filled with random authentication numbers have been developed for with use of video and digital data systems. Authentication techniques, instead of encryption, have been applied since they permit the data to be transmitted \"in the clear\" for anyone to verify the data, but prevent interception of the data transmission and the substitution of false data. This paper explains the algorithms, and how they've been applied to hardware developed for unattended surveillance use.