Novel one round message authentication scheme for constrained IoT devices

被引:0
|
作者
Hassan N. Noura
Ola Salman
Raphaël Couturier
Ali Chehab
机构
[1] Univ. Bourgogne Franche-Comté (UBFC),
[2] FEMTO-ST Institute,undefined
[3] American University of Beirut,undefined
[4] Electrical and Computer Engineering Department,undefined
关键词
Lightweight message authentication algorithm; Dynamic key-dependent cryptography; Security and performance analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Security and privacy concerns have emerged as critical challenges in the Internet-of-Things (IoT) era. These issues need to be carefully addressed due to the sensitive data within IoT systems. However, some IoT devices have various limitations in terms of energy, memory capacity, and computational resources, which makes them extremely vulnerable to security attacks. Data integrity with source authentication are essential security services for protecting IoT data value and utility. Existing message authentication algorithms (MAAs), which are either based on block ciphers or keyed hash functions, require multiple rounds and complex operations, which leads to unacceptable overhead for resource-limited devices and delay-sensitive applications. Moreover, the high number of IoT connected devices generates a huge amount of data, which challenges even the capacity of powerful network devices to handle the security of such Big Data. As such, the protection of such amounts of generated data calls for lightweight security solutions. In this paper, we propose a lightweight MAA that provides data integrity and source authentication. The proposed solution is based on a dynamic key structure with a single round and simple operations. The used cryptographic primitives (substitution and permutation tables) are dynamic and get updated for each new input message by using specific update primitives. The dynamic structure of the proposed MAA allows for decreasing the required number of rounds to just one, while maintaining a high degree of security. The security tests results show that the proposed keyed hash functions (1) achieve the desired cryptographic properties, (2) are immune against existing attacks and (3) require low overhead in terms of computational and storage resources.
引用
收藏
页码:483 / 499
页数:16
相关论文
共 50 条
  • [41] A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT
    Ming, Yang
    Yang, Pengfei
    Mahdikhani, Hassan
    Lu, Rongxing
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2225 - 2236
  • [42] Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices
    Minematsu, Kazuhiko
    Shikata, Junji
    Watanabe, Yohei
    Yanai, Naoto
    IEEE ACCESS, 2023, 11 : 62955 - 62969
  • [43] Efficient approximate message authentication scheme
    Jiang, Shaoquan
    Li, Jue
    Liao, Yongjian
    IET INFORMATION SECURITY, 2018, 12 (01) : 100 - 106
  • [44] Cryptanalysis and improvement of an authentication scheme for IoT
    Kumar, Rahul
    Gupta, Mridul Kumar
    Kumari, Saru
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (1-2) : 73 - 87
  • [45] A Group-oriented Authentication Scheme for IoT Devices in 5G Networks
    Guo, Qili
    Lai, Chengzhe
    Ma, Haoyan
    Zheng, Dong
    2023 19TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN 2023, 2023, : 699 - 706
  • [46] Mutual authentication scheme for smart devices in IoT-enabled smart home systems
    Ma, Qingru
    Tan, Haowen
    Zhou, Tianqi
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [47] A Broadcast Authentication Scheme in IoT Environments
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [48] A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes
    Almadhoun, Randa
    Kadadha, Maha
    Alhemeiri, Maya
    Alshehhi, Maryam
    Salah, Khaled
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [49] Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
    Gope, Prosanta
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 580 - 589
  • [50] Lightweight Authentication for IOT Edge Devices
    Zerraza, Imane
    Informatica (Slovenia), 2024, 48 (18): : 15 - 20