Abstract
Authenticating devices in communication system is an important and challenging task. With many diverse devices getting connected to communicate, establishing authentication of such devices among themselves (or with a central server) is essential to overcome possible attacks in the communication channel and by adversaries. In this paper, an authentication protocol is proposed based on linear error correcting codes, pseudo random numbers and cyclic redundancy check function. General protocol is provided in this paper and can be used for any specific linear error correcting codes defined over finite field. The proposed protocol is resistant against replay attack, man-in-the-middle and impersonation kind of attacks. One of the advantages of the proposed protocol is that it can be incorporated within the framework of any communication system that uses linear error correction system to achieve reliability or can be implemented independently to achieve security in terms of authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Harrison, W.K., Almeida, J., Bloch, M.R., McLaughlin, S.W., Barros, J.: Coding for secrecy: an overview of error-control coding techniques for physical-layer security. IEEE Signal Process. Mag. 30(5), 41–50 (2013)
Mukherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1550–1573 (2014)
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)
Sudan, M.: Coding theory: tutorial & survey. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, pp. 36–53. IEEE (2001)
Maurya, P.K., Pal, J., Bagchi, S.: A coding theory based ultralightweight RFID authentication protocol with CRC. Wirel. Pers. Commun. 97(1), 967–976 (2017)
Friedewald, M., Raabe, O.: Ubiquitous computing: an overview of technology impacts. Telemat. Inform. 28(2), 55–65 (2011)
Liu, Y., Chen, H.H., Wang, L.: Physical layer security for next generation wireless networks: theories, technologies, and challenges. IEEE Commun. Surv. Tutor. 19(1), 347–376 (2017)
Nekovee, M.: Cognitive radio access to TV white spaces: spectrum opportunities, commercial applications and remaining technology challenges. In: 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, pp. 1–10. IEEE (2010)
Rempe, D., Snyder, M., Pracht, A., Schwarz, A., Nguyen, T., Vostrez, M., Zhao, Z., Vuran, M.C.: A cognitive radio TV prototype for effective TV spectrum sharing. In: 2017 IEEE International Symposium on Dynamic Spectrum Access Networks, DySPAN, pp. 1–2. IEEE (2017)
Gilbert, E.N., MacWilliams, F.J., Sloane, N.J.: Codes which detect deception. Bell Labs Tech. J. 53(3), 405–424 (1974)
Simmons, G.J.: Authentication theory/coding theory. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 411–431. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_32
Simmons, G.J.: A survey of information authentication. Proc. IEEE 76(5), 603–620 (1988)
Moulin, P., Koetter, R.: Data-hiding codes. Proc. IEEE 93(12), 2083–2126 (2005)
Schillewaert, J., Thas, K.: Construction and comparison of authentication codes. SIAM J. Discret. Math. 28(1), 474–489 (2014)
Kacewicz, A.: Coding Theory for Security and Reliability in Wireless Networks. Cornell University, Ithaca (2010)
Tsimbalo, E., Fafoutis, X., Piechocki, R.J.: CRC error correction in IoT applications. IEEE Trans. Ind. Inf. 13(1), 361–369 (2017)
Tsimbalo, E., Fafoutis, X., Piechocki, R.: Fix it, don’t bin it!-CRC error correction in Bluetooth low energy. In: 2015 IEEE 2nd World Forum on Internet of Things, WF-IoT, pp. 286–290. IEEE (2015)
Tsimbalo, E., Fafoutis, X., Piechocki, R.J.: CRC error correction for energy-constrained transmission. In: 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC, pp. 430–434. IEEE (2015)
Ez-zazi, I., Arioua, M., El Oualkadi, A., El Assari, Y.: Joint FEC/CRC coding scheme for energy constrained IoT devices. In: Proceedings of the International Conference on Future Networks and Distributed Systems, p. 18. ACM (2017)
Alabady, S.A., Salleh, M.F.M., Al-Turjman, F.: LCPC error correction code for IoT applications. Sustain. Cities Soc. (2018). https://doi.org/10.1016/j.scs.2018.01.036
Moon, T.K.: Error Correction Coding: Mathematical Methods and Algorithms. Wiley, Hoboken (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Pavan Kumar, C., Selvakumar, R. (2018). Authentication Protocol Using Error Correcting Codes and Cyclic Redundancy Check. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_80
Download citation
DOI: https://doi.org/10.1007/978-3-319-94268-1_80
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94267-4
Online ISBN: 978-3-319-94268-1
eBook Packages: Computer ScienceComputer Science (R0)