Abstract

Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al. Our proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms. We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.

Highlights

  • The Internet of Things (IoT), refers to a wide variety of devices that can collect, share data and more to connect to the internet

  • The answer is because many of the aforementioned proposals have been broken [15,16,17,18,19,20] or have a storage and transmission cost unacceptably high [4,6] for highly constrained IoT devices. This new protocol is inspired by the MM proposal [21], i.e. a 2-round authentication protocol based on weak message authentication code (MAC) and provably secure against man-in-the-middle attacks

  • Another aspect that reinforces the security of our protocol is that the prover returns a response to the verifier regardless the outcome of the verification (pfx (2), ). This prevents the attacker from using the RMAC prover as a verification oraclesince it has no way of detecting a change in the behaviour of the RMAC prover following the outcome of the verification of the pair(2′, ). This is a one more security element that our protocol RMAC has over the MM protocol.All this, allows us to say that our protocol can be seen as a generic construction (SC can be replaced by a uf-rma MAC) at least as secure as MM which is a man-inthe-middle secure authentication protocol

Read more

Summary

INTRODUCTION

The Internet of Things (IoT), refers to a wide variety of devices that can collect, share data and more to connect to the internet. The answer is because many of the aforementioned proposals have been broken [15,16,17,18,19,20] or have a storage and transmission cost unacceptably high [4,6] for highly constrained IoT devices This new protocol is inspired by the MM proposal [21], i.e. a 2-round authentication protocol based on weak MACs and provably secure against man-in-the-middle attacks. It exploits the well-studied -round Xor-Cascade Encryption, i.e. a framework for designing block ciphers.

DEFINITION
Message Authentication Codes
MITM secure authentication protocol
EXISTING WORK
THE NEW PROTOCOL
The Lightweight Key Establishment Protocol
The P-box
The RBOX
SECURITY ARGUMENTS
Resistance to Algebraic Attacks
Security of the Lightweight Key Establishment Protocol
Security of the Core Authentication Protocol
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call