TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

被引:0
|
作者
Zheng Gong
Pieter Hartel
Svetla Nikova
Shao-Hua Tang
Bo Zhu
机构
[1] South China Normal University,School of Computer Science
[2] University of Twente,Faculty of Electrical Engineering, Mathematics and Computer Science
[3] Katholieke Universiteit Leuven,Department of ESAT/SCD
[4] South China University of Technology,COSIC
[5] University of Waterloo,School of Computer Science and Engineering
来源
Journal of Computer Science and Technology | 2014年 / 29卷
关键词
message authentication code; body sensor network; low-resource implementation;
D O I
暂无
中图分类号
学科分类号
摘要
A wireless sensor network (WSN) commonly requires lower level security for public information gathering, whilst a body sensor network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the message authentication codes (MACs), which were proposed in the popular security architectures for WSNs, are reconsidered. The analysis shows that the recommended MACs for WSNs, e.g., CBCMAC (TinySec), OCB-MAC (MiniSec), and XCBC-MAC (SenSec), might not be exactly suitable for BSNs. Particularly an existential forgery attack is elaborated on XCBC-MAC. Considering the hardware limitations of BSNs, we propose a new family of tunable lightweight MAC based on the PRESENT block cipher. The first scheme, which is named TuLP, is a new lightweight MAC with 64-bit output range. The second scheme, which is named TuLP-128, is a 128-bit variant which provides a higher resistance against internal collisions. Compared with the existing schemes, our lightweight MACs are both time and resource efficient on hardware-constrained devices.
引用
收藏
页码:53 / 68
页数:15
相关论文
共 50 条
  • [1] TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks
    龚征
    Pieter Hartel
    Svetla Nikova
    唐韶华
    朱博
    Journal of Computer Science & Technology, 2014, 29 (01) : 53 - 68
  • [2] TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks
    Gong, Zheng
    Hartel, Pieter
    Nikova, Svetla
    Tang, Shao-Hua
    Zhu, Bo
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 53 - 68
  • [3] Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks
    Shin, Sooyeon
    Kim, Minwoo
    Kwon, Taekyoung
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (11):
  • [4] Lightweight and compromise-resilient message authentication in sensor networks
    Zhang, Wensheng
    Subramanian, Nalin
    Wang, Guiling
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 2092 - +
  • [5] A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3808 - 3819
  • [6] Analysis of Lightweight Message Authentication Codes for IoT Environments
    Saldamli, Gokay
    Ertaul, Levent
    Shankaralingappa, Asharani
    2019 FOURTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2019, : 235 - 240
  • [7] Hash message authentication codes for securing data in wireless body area networks
    Nagasundharamoorthi, Insozhan
    Venkatesan, Prabhu
    Velusamy, Parthasarathy
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (05):
  • [8] Exploring message authentication in sensor networks
    Vogt, H
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 19 - 30
  • [9] Message Authentication for Wireless Sensor Networks
    Moises Salinas, R.
    Gina Gallegos, G.
    Gonzalo Duchen, S.
    PROCEEDINGS OF THE 15TH AMERICAN CONFERENCE ON APPLIED MATHEMATICS AND PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES 2009, VOLS I AND II, 2009, : 386 - +
  • [10] Securing wireless sensor networks from node clone attack: A lightweight message authentication algorithm
    Mohindru V.
    Singh Y.
    Bhatt R.
    International Journal of Information and Computer Security, 2020, 12 (2-3): : 217 - 233