Hash Function and Lightweight Encryption Aided Authentication Design for Radio Frequency Watermarking Systems

被引:0
|
作者
Zhang, Lin [1 ]
Zhang, Ziyong [1 ]
Wu, Chen [1 ]
Zheng, Jieheng [1 ]
Wu, Zhiqiang [2 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou, Peoples R China
[2] Tibet Univ, Sch Informat Sci & Technol, Lhasa, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Bit error rate; Digest and Hash function; Lightweight encryption; Radio frequency watermark; Security;
D O I
10.1109/VTC2023-Spring57618.2023.10200491
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio frequency watermarking systems embed the secret watermark bits into host bits for secure transmissions. However, malicious users may initiate falsifying attacks via broadcasting wireless channels. Meanwhile, the interferences of watermark signals to host signals will degrade the bit error rate (BER) performances. With the aim to enhance both the security and the reliability performances, we propose to utilize the Hash function to generate the unique digital digest of host signals for the integrity check. Then the lightweight encryption and spreading are conducted to compose the watermark signals. At the receiver, reverse operations are performed to recover both host signals and watermark signals. Then the retrieved digest is used to check the integrity and validity of host signals to combat falsifying attacks. Subsequently, we derive the bit error rate (BER) and the information leakage expressions. Simulation results are then provided to validate the proposed design.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Research on the Authentication of Radio Frequency Identification based on the Hash function
    Bai Zhi
    He Yi-Gang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 209 - 216
  • [2] A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications
    Kavun, Elif Bilge
    Yalcin, Tolga
    RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 258 - 269
  • [3] A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
    Cao, Fang-Ming
    Liu, Dao-Wei
    International Journal of Network Security, 2022, 24 (03): : 436 - 443
  • [4] A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems
    Ikram, Muhammad
    Chowdhury, Md. Aminul Haque
    Redwan, Hassen
    Koh, Jong-Bin
    Kim, Ki-Hyung
    Kim, Dong-Kyoo
    2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 289 - 296
  • [5] Design of Lightweight Hash Function based on Iterate
    Gao, Shujing
    Zhang, Ruiquan
    Zhang, Wei
    APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 786 - 789
  • [6] Design and statistical analysis of a hash-aided image watermarking system
    Cannons, J
    Moulin, P
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (10) : 1393 - 1408
  • [7] Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
    Cao, Fang-Ming
    He, Xiao-Ping
    International Journal of Network Security, 2024, 26 (01) : 98 - 105
  • [8] Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM
    Yalcin, ME
    Vandewalle, J
    CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS, 2002, : 399 - 406
  • [9] An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    Ren, Xuping
    Xu, Xianghua
    Li, Yunfa
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2405 - 2412
  • [10] Auto-authentication watermarking scheme based on CNN and perceptual hash function in the wavelet domain
    Rhayma, Hanen
    Ejbali, Ridha
    Hamam, Habib
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (21) : 60079 - 60101