Challenge-response based ACK message authentication

被引:4
|
作者
Park, Min-Ho [1 ]
机构
[1] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA 15213 USA
关键词
D O I
10.1049/el.2012.1128
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although ACK (acknowledgement) should be short since it simply notifies a successful receipt, the actual size of ACK packets increases because of a message header or security options. Especially, in wireless sensor networks where efficiency is the highest priority due to the limited sensor resources, the size of ACK may be reduced by omitting some header fields or security options. However, this pursuit of efficiency can cause security vulnerability such as a faked ACK. In turn, the ACK cannot achieve the original purpose, i.e. to provide reliable communication, any more. Therefore, proposed is a novel ACK message authentication method based on a challenge-response authentication, which can achieve efficiency and security at the same time.
引用
收藏
页码:1021 / 1022
页数:2
相关论文
共 50 条
  • [1] ENTITY AUTHENTICATION BASED ON CHALLENGE-RESPONSE TECHNIQUES
    Oros, Horea
    Boian, Florian M.
    [J]. KEPT 2009: KNOWLEDGE ENGINEERING PRINCIPLES AND TECHNIQUES, 2009, : 373 - +
  • [2] LIMITATIONS OF CHALLENGE-RESPONSE ENTITY AUTHENTICATION
    MITCHELL, C
    [J]. ELECTRONICS LETTERS, 1989, 25 (17) : 1195 - 1196
  • [3] Challenge-Response Authentication Scheme With Chaotic Lasers
    Annovazzi-Lodi, Valerio
    Lombardi, Lorenzo
    Aromataris, Giuseppe
    [J]. IEEE JOURNAL OF QUANTUM ELECTRONICS, 2022, 58 (01)
  • [4] Challenge-response based RFID authentication protocol for distributed database environment
    Rhee, K
    Kwak, J
    Kim, S
    Won, D
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 70 - 84
  • [5] Analysis of Challenge-Response Authentication in a Networked Control System
    Rzasa, Wojciech
    Rzonca, Dariusz
    Stec, Andrzej
    Trybus, Bartosz
    [J]. COMPUTER NETWORKS, 2012, 291 : 271 - 279
  • [6] 2-clickAuth - Optical Challenge-Response Authentication
    Vapen, Anna
    Byers, David
    Shahmehri, Nahid
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 79 - 86
  • [7] Analysis of Challenge-Response Authentication with Reconfigurable Intelligent Surfaces
    Tomasin, Stefano
    Elwakeel, Tarek N. M. M.
    Guglielmi, Anna Valeria
    Maes, Robin
    Noels, Nele
    Moeneclaey, Marc
    [J]. IEEE Transactions on Information Forensics and Security, 2024, 19 : 9494 - 9507
  • [8] Asynchronous Challenge-Response Authentication Solution based on Smart Card in Cloud Environment
    Zhao, Guifen
    Li, Ying
    Du, Liping
    Zhao, Xin
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 156 - 159
  • [9] Off-Path Hacking: The Illusion of Challenge-Response Authentication
    Gilad, Yossi
    Herzberg, Amir
    Shulman, Haya
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 68 - 77
  • [10] VELODY: Nonlinear Vibration Challenge-Response for Resilient User Authentication
    Li, Jingjie
    Fawaz, Kassem
    Kim, Younghyun
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1201 - 1213