HBC entity authentication for low-cost pervasive devices

被引:2
|
作者
Li, Z. [1 ]
Gong, G. [2 ]
机构
[1] Cisco Syst Co, Ottawa, ON, Canada
[2] Univ Waterloo, Dept Elect Comp & Engn, Waterloo, ON N2L 3G1, Canada
关键词
PROTOCOLS; SECURITY;
D O I
10.1049/iet-ifs.2011.0052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The HB-like entity authentication protocols for low-cost pervasive devices have attracted a great deal of attention because of their simplicity, computational efficiency and solid security foundation on a well-studied hard problem-learning parity with noise. By far, the most efficient protocol is HB#, which is provably resistant to the GRS attack under the conjecture that it is secure in the DET-model. However, in order to achieve 80-bit security, a typical HB# authentication key comprises over 1000 bits, which imposes considerable storage burdens on resource-constrained devices. In this study, the authors propose a new HB-like protocol: HBC. The protocol makes use of a special type of circulant matrix, in contrast to the Toeplitz matrix in HB#, to significantly reduce storage consumption and overcome a subtle security proof inefficacy in HB#. In addition, the authors introduce a masking technique that substantially increases noise level from an adversary's standpoint, and thus improves protocol performance. The authors demonstrate that 613-bit authentication key suffices for 80-bit security in the HBC protocol, which is quite competitive and more appealing for low-cost devices.
引用
收藏
页码:212 / 218
页数:7
相关论文
共 50 条
  • [1] Unilateral Authentication on Low-cost Devices
    Clupek, Vlastimil
    Zeman, Vaclav
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 88 - 92
  • [2] Towards Robust Low Cost Authentication for Pervasive Devices
    Oeztuerk, Erdinc
    Hammouri, Ghaith
    Sunar, Berk
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 170 - 178
  • [3] A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
    Catuogno, Luigi
    Galdi, Clemente
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 16 - +
  • [4] Low-cost Implementations of NTRU for pervasive security
    Atici, Ali Can
    Batina, Lejla
    Fan, Junfeng
    Verbauwhede, Ingrid
    Yalcin, S. Berna Oers
    [J]. 2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, : 79 - +
  • [5] Soft Authentication with Low-Cost Signatures
    Buthpitiya, Senaka
    Dey, Anind K.
    Griss, Martin
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2014, : 172 - 180
  • [6] LOW-COST PERVASIVE 'MOBI-IN-A-BOX'
    Jung, Tzyy-Ping
    Wu, Ying
    Wang, Tu-Te
    Zheng, Guang-Yu
    Gan, Gary
    Zao, John
    [J]. PSYCHOPHYSIOLOGY, 2015, 52 : S10 - S10
  • [7] LOW-COST TAPE DEVICES
    HOBBS, LC
    [J]. COMPUTER, 1976, 9 (03) : 21 - 29
  • [8] Low-Cost Untraceable Authentication Protocols for RFID
    Lee, Yong Ki
    Batina, Lejla
    Singelee, Dave
    Verbauwhede, Ingrid
    [J]. WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 55 - 64
  • [9] A Lightweight Authentication Protocol for Low-Cost RFID
    Hung-Yu Chien
    Chen-Wei Huang
    [J]. Journal of Signal Processing Systems, 2010, 59 : 95 - 102
  • [10] RFID Authentication Protocol for Low-cost Tags
    Song, Boyeon
    Mitchell, Chris J.
    [J]. WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 140 - 147