ii). The authenticity and integrity of the received communication are important to the monitoring platform. In other words, the platform needs to make sure any communication it accepts is indeed from the device and that the information has not been tampered with in transit. Identify the security requirement on the MAC component for the above protocol to provide authenticity and integrity guarantees. Briefly justify your answer.
(iv). Consider Designs B and C only. For each design when used in the protocol above, discuss if the required goals of authenticity and integrity are met. In each case, provide a convincing argument or an attack to support your answer.
Sample Solution