Novel one round message authentication scheme for constrained IoT devices

被引:0
|
作者
Hassan N. Noura
Ola Salman
Raphaël Couturier
Ali Chehab
机构
[1] Univ. Bourgogne Franche-Comté (UBFC),
[2] FEMTO-ST Institute,undefined
[3] American University of Beirut,undefined
[4] Electrical and Computer Engineering Department,undefined
关键词
Lightweight message authentication algorithm; Dynamic key-dependent cryptography; Security and performance analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy concerns have emerged as critical challenges in the Internet-of-Things (IoT) era. These issues need to be carefully addressed due to the sensitive data within IoT systems. However, some IoT devices have various limitations in terms of energy, memory capacity, and computational resources, which makes them extremely vulnerable to security attacks. Data integrity with source authentication are essential security services for protecting IoT data value and utility. Existing message authentication algorithms (MAAs), which are either based on block ciphers or keyed hash functions, require multiple rounds and complex operations, which leads to unacceptable overhead for resource-limited devices and delay-sensitive applications. Moreover, the high number of IoT connected devices generates a huge amount of data, which challenges even the capacity of powerful network devices to handle the security of such Big Data. As such, the protection of such amounts of generated data calls for lightweight security solutions. In this paper, we propose a lightweight MAA that provides data integrity and source authentication. The proposed solution is based on a dynamic key structure with a single round and simple operations. The used cryptographic primitives (substitution and permutation tables) are dynamic and get updated for each new input message by using specific update primitives. The dynamic structure of the proposed MAA allows for decreasing the required number of rounds to just one, while maintaining a high degree of security. The security tests results show that the proposed keyed hash functions (1) achieve the desired cryptographic properties, (2) are immune against existing attacks and (3) require low overhead in terms of computational and storage resources.
引用
收藏
页码:483 / 499
页数:16
相关论文
共 50 条
  • [31] A Novel Revocable Lightweight Authentication Scheme for Resource-Constrained Devices in Cyber-Physical Power Systems
    Li, Xue
    Jiang, Cheng
    Du, Dajun
    Fei, Minrui
    Wu, Lei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 5280 - 5292
  • [32] LISA: Visible light based initialization and SMS based authentication of constrained IoT devices
    Perkovic, Toni
    Cagalj, Mario
    Kovacevic, Tonko
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 : 105 - 118
  • [33] Towards serverless fast one round authentication with two mobile end devices
    Jin Wook Byun
    The Journal of Supercomputing, 2023, 79 : 5684 - 5704
  • [34] Towards serverless fast one round authentication with two mobile end devices
    Byun, Jin Wook
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 5684 - 5704
  • [35] A Novel Message Authentication Scheme With Absolute Privacy for the Internet of Things Networks
    Li, Jian
    Zhang, Zhenjiang
    Hui, Lin
    Zhou, Zhangbing
    IEEE ACCESS, 2020, 8 (08): : 39689 - 39699
  • [36] A novel authentication scheme for secure data sharing in IoT enabled agriculture
    Kumbi, Arun
    Birje, Mahantesh N.
    WEB INTELLIGENCE, 2024, 22 (03) : 381 - 400
  • [37] A novel protocol for efficient authentication in cloud-based IoT devices
    Irfan Alam
    Manoj Kumar
    Multimedia Tools and Applications, 2022, 81 : 13823 - 13843
  • [38] A novel protocol for efficient authentication in cloud-based IoT devices
    Alam, Irfan
    Kumar, Manoj
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13823 - 13843
  • [39] An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices
    Chhikara, Prateek
    Tekchandani, Rajkumar
    Kumar, Neeraj
    Obaidat, Mohammad S.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12597 - 12609
  • [40] A Lightweight XMPP Publish/Subscribe Scheme for Resource-Constrained IoT Devices
    Wang, Heng
    Xiong, Daijin
    Wang, Ping
    Liu, Yuqiang
    IEEE ACCESS, 2017, 5 : 16393 - 16405