Efficient and secure message authentication algorithm at the physical layer

Loading...
Thumbnail Image

Date

2020

Journal Title

Journal ISSN

Volume Title

Publisher

Springer

Abstract

Message authentication, which refers to source authentication and message integrity, is an essential security service, especially in emerging networks such as peer-to-peer, Device-to-Device, LPWAN (such as NB-IoT, LTE-M or SigFox) and vehicle to vehicle. Traditionally, message authentication schemes handled at upper layers of the protocol stack. Such schemes require multiple rounds and multiple operations per round, which results in a considerable overhead in terms of latency and required resources. Recently, many research works have shifted towards investigating the design of new security solutions at the physical layer (PLS). Although data confidentiality and device authentication schemes have been introduced at the physical layer, yet, no PLS message authentication scheme has been presented. In this paper, we propose a dynamic message authentication algorithm (keyed hash function) that makes use of a secret session key in addition to the random characteristics of the physical channel. Moreover, the cryptographic primitives are dynamic and get updated in a lightweight manner for every input frame symbol. Security and performance analysis were conducted to validate the efficiency and robustness of the proposed scheme. The results confirmed that the proposed authentication scheme exhibits a high level of security with minimum overhead in terms of delay. © 2020, Springer Science+Business Media, LLC, part of Springer Nature.

Description

Keywords

Data integrity and source authentication, Lpwan, Physical layer hash function, Security and performance analysis, Dynamics, Hash functions, Mobile telecommunication systems, Peer to peer networks, Physical layer, Authentication scheme, Cryptographic primitives, Device authentications, Message authentication, Message authentication algorithms, Random characteristics, Security and performance, Source authentication, Authentication

Citation

Endorsement

Review

Supplemented By

Referenced By