Novel one round message authentication scheme for constrained IoT devices

被引:0
|
作者
Hassan N. Noura
Ola Salman
Raphaël Couturier
Ali Chehab
机构
[1] Univ. Bourgogne Franche-Comté (UBFC),
[2] FEMTO-ST Institute,undefined
[3] American University of Beirut,undefined
[4] Electrical and Computer Engineering Department,undefined
关键词
Lightweight message authentication algorithm; Dynamic key-dependent cryptography; Security and performance analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy concerns have emerged as critical challenges in the Internet-of-Things (IoT) era. These issues need to be carefully addressed due to the sensitive data within IoT systems. However, some IoT devices have various limitations in terms of energy, memory capacity, and computational resources, which makes them extremely vulnerable to security attacks. Data integrity with source authentication are essential security services for protecting IoT data value and utility. Existing message authentication algorithms (MAAs), which are either based on block ciphers or keyed hash functions, require multiple rounds and complex operations, which leads to unacceptable overhead for resource-limited devices and delay-sensitive applications. Moreover, the high number of IoT connected devices generates a huge amount of data, which challenges even the capacity of powerful network devices to handle the security of such Big Data. As such, the protection of such amounts of generated data calls for lightweight security solutions. In this paper, we propose a lightweight MAA that provides data integrity and source authentication. The proposed solution is based on a dynamic key structure with a single round and simple operations. The used cryptographic primitives (substitution and permutation tables) are dynamic and get updated for each new input message by using specific update primitives. The dynamic structure of the proposed MAA allows for decreasing the required number of rounds to just one, while maintaining a high degree of security. The security tests results show that the proposed keyed hash functions (1) achieve the desired cryptographic properties, (2) are immune against existing attacks and (3) require low overhead in terms of computational and storage resources.
引用
收藏
页码:483 / 499
页数:16
相关论文
共 50 条
  • [1] Novel one round message authentication scheme for constrained IoT devices
    Noura, Hassan N.
    Salman, Ola
    Couturier, Raphael
    Chehab, Ali
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 483 - 499
  • [2] A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices
    Noura, Hassan N.
    Salman, Ola
    Couturier, Raphael
    Chehab, Ali
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 17885 - 17900
  • [3] Lightweight Message Authentication for Constrained Devices
    Dubrova, Elena
    Naslund, Mats
    Selander, Goran
    Lindqvist, Fredrik
    WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, : 196 - 201
  • [4] iMAC: Implicit Message Authentication Code for IoT Devices
    Ullah, Ikram
    Meratnia, Nirvana
    Havinga, Paul J. M.
    2020 IEEE 6TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2020,
  • [5] SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices
    Farha, Fadi
    Ning, Huansheng
    Ali, Karim
    Chen, Liming
    Nugent, Christopher
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5904 - 5913
  • [6] Novel Light Weight Hardware Authentication Protocol for Resource Constrained IoT Based Devices
    Vijaykumar, V. R.
    Sekar, S. Raja
    Jothin, R.
    Diniesh, V. C.
    Elango, S.
    Ramakrishnan, S.
    IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2024, 8 (31-42): : 31 - 42
  • [7] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [8] Cumulative Message Authentication Codes for Resource-Constrained IoT Networks
    Li, He
    Kumar, Vireshwar
    Park, Jung-Min
    Yang, Yaling
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (15): : 11847 - 11859
  • [9] One round cipher algorithm for multimedia IoT devices
    Noura, Hassan
    Chehab, Ali
    Sleem, Lama
    Noura, Mohamad
    Couturier, Raphael
    Mansour, Mohammad M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18383 - 18413
  • [10] One round cipher algorithm for multimedia IoT devices
    Hassan Noura
    Ali Chehab
    Lama Sleem
    Mohamad Noura
    Raphaël Couturier
    Mohammad M. Mansour
    Multimedia Tools and Applications, 2018, 77 : 18383 - 18413