Lightweight and secure cipher scheme for multi-homed systems
| dc.contributor.author | Noura, Hassan N. | |
| dc.contributor.author | Melki, Reem | |
| dc.contributor.author | Malli, Mohammad | |
| dc.contributor.author | Chehab, Ali | |
| dc.contributor.department | Department of Electrical and Computer Engineering | |
| dc.contributor.faculty | Maroun Semaan Faculty of Engineering and Architecture (MSFEA) | |
| dc.contributor.institution | American University of Beirut | |
| dc.date.accessioned | 2025-01-24T11:30:14Z | |
| dc.date.available | 2025-01-24T11:30:14Z | |
| dc.date.issued | 2020 | |
| dc.description.abstract | Multiple access technologies allow a network to connect to two or more communication networks efficiently, to enhance system performance. They are more robust and reliable than legacy technologies, which allow the connection to one network at a time. In this paper, a new and efficient dynamic and key-dependent cipher scheme is designed to secure multi-homed devices, in real-time, while preserving their main functionality and meeting the stringent Quality of Service requirements. The proposed scheme consists of a dynamic key derivation technique that mixes together a dynamic nonce and a secret key. The dynamic nonce is extracted from multiple channels, after establishing a new session. The proposed approach is based on simple operations such as substitution and permutation, to enhance the network robustness against different types of attacks. The dynamicity is based on the random nature of physical channels and as such, data confidentiality, integrity and source authentication are achieved with the least amount of resources, delay and computational complexity. The implementation of the proposed cipher scheme is appropriate for small and resource-constrained devices including IoT devices and mobile phones (battery-constrained devices). Theoretical and simulation results confirm that the cipher scheme has a better efficiency than other recent schemes, which require multiple rounds. In addition, a cryptanalysis discussion is provided towards proving that the proposed cipher is capable of resisting and preventing the different existing cryptanalysis and security attacks. © 2020, Springer Science+Business Media, LLC, part of Springer Nature. | |
| dc.identifier.doi | https://doi.org/10.1007/s11276-020-02362-8 | |
| dc.identifier.eid | 2-s2.0-85085966955 | |
| dc.identifier.uri | http://hdl.handle.net/10938/27397 | |
| dc.language.iso | en | |
| dc.publisher | Springer | |
| dc.relation.ispartof | Wireless Networks | |
| dc.source | Scopus | |
| dc.subject | Cryptanalysis | |
| dc.subject | Efficient and secure cipher scheme | |
| dc.subject | Multi-homing security | |
| dc.subject | One round cipher scheme | |
| dc.subject | Quality of service | |
| dc.subject | Constrained devices | |
| dc.subject | Data confidentiality | |
| dc.subject | Legacy technologies | |
| dc.subject | Multi-homed systems | |
| dc.subject | Multiple access technology | |
| dc.subject | Network robustness | |
| dc.subject | Resourceconstrained devices | |
| dc.subject | Source authentication | |
| dc.subject | Cryptography | |
| dc.title | Lightweight and secure cipher scheme for multi-homed systems | |
| dc.type | Article |
Files
Original bundle
1 - 1 of 1