A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

被引:14
作者
Trinh, Cuong [1 ]
Huynh, Bao [2 ]
Lansky, Jan [3 ]
Mildeova, Stanislava [4 ]
Safkhani, Masoumeh [4 ]
Bagheri, Nasour [5 ,6 ]
Kumari, Saru [7 ]
Hosseinzadeh, Mehdi [8 ,9 ]
机构
[1] Ton Duc Thang Univ, Fac Informat Technol, Artificial Intelligence Lab, Ho Chi Minh City 700000, Vietnam
[2] Ho Chi Minh City Univ Technol HUTECH, Fac Informat Technol, Ho Chi Minh City 70000, Vietnam
[3] Univ Finance & Adm, Fac Econ Studies, Dept Comp Sci & Math, Prague 10100, Czech Republic
[4] Shahid Rajaee Teacher Training Univ, Comp Engn Dept, Tehran 1678815811, Iran
[5] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[6] Inst Res Fundamental Sci IPM, Sch Comp Sci SCS, Farmanieh Campus, Tehran 1953833511, Iran
[7] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[8] Duy Tan Univ, Inst Res & Dev, Da Nang 550000, Vietnam
[9] Iran Univ Med Sci, Hlth Management & Econ Res Ctr, Tehran 1666887635, Iran
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Protocols; Radiofrequency identification; Authentication; Electronic mail; Ciphers; Economics; Internet of Things (IoT); mutual authentication; security analysis; lightweight protocol; GNY logic; scyther; FORMAL ANALYSIS; SECURITY; CRYPTANALYSIS; DEVICES; SCHEME; TOOL;
D O I
10.1109/ACCESS.2020.3021701
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The communication security of constrained objects such as radio frequency identification (RFID) tags and wireless sensor network (WSN) is very challenging because it is not always possible to use the conventional on-the-shelf solutions for them, due to their limited available power and computational capabilities. To deal with this demand, many security protocols have been developed by the researchers so far. However, in many cases, the later analyses that have been carried out on these protocols have shown that they are vulnerable to one or few attacks, which could be enough to eliminate any application for such protocols. Following this direction, in this article, we analyze the security of four recent ultra-lightweight/lightweight protocols, by presenting important attacks including secret disclosure attack and desynchronization attack against them. To address the shortcoming of the previous protocols, we present a new security protocol based on lightweight block ciphers name it LBCbAP. In this protocol, we use CRAFT as the core security primitive. CRAFT is a tweakable block cipher which has been recently proposed and independent security analysis confirmed its security. Our detailed security analysis of LBCbAP, which is performed both informally and formally through the GNY logic and the Scyther tool, demonstrates its security against various types of attacks including secret disclosure and desynchronization attacks. The cost analysis of the designed protocol and comparison with the related lightweight protocols show that LBCbAP is cost efficient.
引用
收藏
页码:165536 / 165550
页数:15
相关论文
共 51 条
  • [1] SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
    Aghili, Seyed Farhad
    Mala, Hamid
    Kaliyar, Pallavi
    Conti, Mauro
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 621 - 634
  • [2] [Anonymous], 2019, Lightweight cryptography
  • [3] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
  • [4] Privacy-friendly synchronized ultralightweight authentication protocols in the storm
    Avoine, Gildas
    Carpent, Xavier
    Martin, Benjamin
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (02) : 826 - 843
  • [5] GIFT: A Small Present Towards Reaching the Limit of Lightweight Encryption
    Banik, Subhadeep
    Pandey, Sumit Kumar
    Peyrin, Thomas
    Sasaki, Yu
    Sim, Siang Meng
    Todo, Yosuke
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 321 - 345
  • [6] The SIMON and SPECK lightweight block ciphers
    Beaulieu, Ray
    Shors, Douglas
    Smith, Jason
    Treatman-Clark, Stefan
    Weeks, Bryan
    Wingers, Louis
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [7] CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
    Beierle, Christof
    Leander, Gregor
    Moradi, Amir
    Rasoolzadeh, Shahram
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (01) : 5 - 45
  • [8] The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
    Beierle, Christof
    Jean, Jeremy
    Koelbl, Stefan
    Leander, Gregor
    Moradi, Amir
    Peyrin, Thomas
    Sasaki, Yu
    Sasdrich, Pascal
    Sim, Siang Meng
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 123 - 153
  • [9] Automated formal analysis of a protocol for secure file sharing on untrusted storage
    Blanchet, Bruno
    Chaudhuri, Avik
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 417 - +
  • [10] Brodani D., 2019, ACTA INF PRAGENSIA, V8, P4