On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques

被引:4
作者
Adekunle, A. A. [1 ]
Woodhead, S. R. [1 ]
机构
[1] Univ Greenwich, Dept Comp & Commun Engn, Chatham ME4 4TB, Kent, England
来源
THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS | 2009年
关键词
Message authentication code; data integrity; data origin authentication; Skipjack; wireless sensor networks; SECURITY; CODE; MACS;
D O I
10.1109/NGMAST.2009.78
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs Quicker Block Chaining MAC1 (QBC-MAC1) and Quicker Block Chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU instruction clock cycle and energy requirement when benchmarked against the de facto Cipher Block Chaining MAC (CBC-MAC) based construct used in the Tiny Sec security protocol for wireless sensor networks.
引用
收藏
页码:419 / 424
页数:6
相关论文
共 22 条
  • [1] [Anonymous], 1998, SKIPJACK KEA ALG SPE
  • [2] [Anonymous], 9797 ISOIEC
  • [3] [Anonymous], P 7 ANN INT C MOB CO
  • [4] The security of the cipher block chaining message authentication code
    Bellare, M
    Kilian, J
    Rogaway, P
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) : 362 - 399
  • [5] Bellare M., 1997, P 38 S FDN COMP SCI
  • [6] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
  • [7] Black J, 2000, LECT NOTES COMPUT SC, V1880, P197
  • [8] Daemen J, 2005, LECT NOTES COMPUT SC, V3557, P1
  • [9] Daemen Joan, 2005, Report 2005/088
  • [10] *FIPS, 2000, FIPS PUBL, V1862