Cumulative Message Authentication Codes for Resource-Constrained Networks

01/15/2020
by   He Li, et al.
0

In emerging applications, such as intelligent automotive systems, Internet-of-Things (IoT) and industrial control systems, the use of conventional message authentication codes (MACs) to provide message authentication and integrity is not possible due to the large size of the MAC output. A straightforward yet naive solution to this problem is to employ a truncated MAC which undesirably sacrifices cryptographic strength in exchange for reduced communication overhead. In this paper, we address this problem by proposing a novel approach for message authentication called Cumulative Message Authentication Code (CuMAC), which consists of two distinctive procedures: aggregation and accumulation. In aggregation, a sender generates compact authentication tags from segments of multiple MACs by using a systematic encoding procedure. In accumulation, a receiver accumulates the cryptographic strength of the underlying MAC by collecting and verifying the authentication tags. Embodied with these two procedures, CuMAC enables the receiver to achieve an advantageous trade-off between the cryptographic strength and the latency in processing of the authentication tags. We have carried out comprehensive evaluations of CuMAC in two real-world applications: low-power wide-area network and in-vehicle controller area network. Our evaluation methodology included simulations as well as a prototype implementation of CuMAC on a real car.

READ FULL TEXT

page 1

page 9

research
05/10/2020

A Generic Message Authentication Code: A combination of the Inter MAC and Carter-Wegman MAC

Message Authentication Code (MAC) is a method for providing integrity an...
research
03/15/2021

Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes

Message authentication guarantees the integrity of messages exchanged ov...
research
08/08/2023

Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems

Attacks against industrial control systems (ICSs) often exploit the insu...
research
11/08/2022

Computational indistinguishability and boson sampling

We introduce a computational problem of distinguishing between the outpu...
research
04/28/2020

Specifying a Cryptographical Protocol in Lustre and SCADE

We present SCADE and Lustre models of the Message Authenticator Algorith...
research
01/20/2020

Physical Layer Security: Authentication, Integrity and Confidentiality

The goal of physical layer security (PLS) is to make use of the properti...
research
07/16/2020

Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions

We consider the problem of provably securing a given control loop implem...

Please sign up or login with your details

Forgot password? Click here to reset