Abstract
In this paper we propose a new lightweight authentication protocol. It is a two-level protocol which supports unbounded message transmission. It is suitable for several settings, from the standard sender-receiver setting to unreliable broadcast and multicast communication in networks with resource-constrained devices. The key ideas underlying our design are the use of the Guy Fawkes signatures, the hash-chaining method, and some techniques used in MAC-based authentication protocols for multicast communication. To our knowledge, our protocol is the first one that solves the unbounded number of message transmission issue in unreliable settings. It does not lose efficiency and introduces only a constant-size overhead in message transmission compared to solutions for a bounded number of message transmissions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Notice that this element in the worst case is \(K_1^0\), from the initial packet \(P_0\), in case \(P_j\) is the first packet received in \(I_1\).
References
Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A new family of authentication protocols. SIGOPS Oper. Syst. Rev. 32(4), 9–20 (1998)
Cheung, S.: An efficient message authentication scheme for link state routing. In: Proceedings of the Computer Security Applications Conference (1997)
Heer, T., Götz, S., Morchon, O.G., Wehrle, K.: ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. In: Proceedings of ACM CoNEXT 2008, Madrid, Spain, 10–12 December 2008
Lamport, L.: Constructing digital signatures from a one-way function, SRI TR CSL - 98 (1979)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, pp. 56–73 (2000)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Proceedings of Network and Distributed System Security Symposium (NDSS 2001), pp. 35–46 (2001)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
D’Arco, P., De Prisco, R., Perez del Pozo, A. (2018). An Efficient and Reliable Two-Level Lightweight Authentication Protocol. In: Castiglione, A., Pop, F., Ficco, M., Palmieri, F. (eds) Cyberspace Safety and Security. CSS 2018. Lecture Notes in Computer Science(), vol 11161. Springer, Cham. https://doi.org/10.1007/978-3-030-01689-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-01689-0_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01688-3
Online ISBN: 978-3-030-01689-0
eBook Packages: Computer ScienceComputer Science (R0)