Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes

03/15/2021
by   Eric Wagner, et al.
0

Message authentication guarantees the integrity of messages exchanged over untrusted channels. However, the required per-message authentication tags considerably expand packet sizes, which is especially problematic in constrained environments. To address this issue, progressive message authentication aggregates and distributes integrity protection over multiple messages, promising to reduce overheads while upholding strong security of traditional integrity protection. However, as we show in this paper, existing progressive message authentication schemes are susceptible to packet drops: By inferring with just two selected packets, an attacker can remove integrity protection from a complete sequence of messages. Revisiting the security of progressive message authentication, we consider it imperative to thwart such attacks by rethinking how authentication tags depend on the successful reception of packets. We propose R2-D2, which relies on (i) optimal message dependencies, (ii) parametrizable security guarantees, (iii) randomized bit dependencies, and (iv) optional immediate protection bits to address this problem. To deploy our approach to resource-constrained devices, we introduce SP-MAC, which implements R2-D2 using efficient XOR operations. Our evaluation shows that SP-MAC protects against sophisticated network-layer attacks and even operates more resource-conscious and faster than existing progressive message authentication schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/19/2022

BP-MAC: Fast Authentication for Short Messages

Resource-constrained devices increasingly rely on wireless communication...
research
08/08/2023

Caching-based Multicast Message Authentication in Time-critical Industrial Control Systems

Attacks against industrial control systems (ICSs) often exploit the insu...
research
01/15/2020

Cumulative Message Authentication Codes for Resource-Constrained Networks

In emerging applications, such as intelligent automotive systems, Intern...
research
09/13/2019

Supervised Learning for Physical Layer based Message Authentication in URLLC scenarios

PHYSEC based message authentication can, as an alternative to convention...
research
10/03/2021

Architecture of Network Camera Photo Authentication Scheme using Steganography Approach

The aim of integrity protection process is not only to secure the send m...
research
06/06/2022

LIN-MM: Multiplexed Message Authentication Code for Local Interconnect Network message authentication in road vehicles

The automotive market is profitable for cyberattacks with the constant s...
research
11/17/2020

Secure Location-Aware Authentication and Communication for Intelligent Transportation Systems

Intelligent transportation systems (ITS) are expected to effectively cre...

Please sign up or login with your details

Forgot password? Click here to reset