RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT
AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
Ahmad Khoureich Ka
Department of Computer Science,
University of Alioune Diop de Bambey,Senegal
ABSTRACT
Nowadays, highly constrained IoT
devices have earned an important place in our everyday lives. These devices
mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor
Networks) components. Their adoption is growing in areas where data security or
privacy or both must be guaranteed. Therefore, it is necessary to develop
appropriate security solutions for these systems. Many papers have proposed
solutions for encryption or authentication. But it turns out that sometimes the
proposal has security flaw or is ill-suited for the constrained IoT devices
(which has very limited processing and storage capacities).In this paper, we
introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a
generic construction of authentication protocol proposed by Mol et al. Our
proposal named RMAC is well suited for highly constrained IoT devices since its
implementation uses simple and lightweight algorithms. We also prove that RMAC
is at least as secure as the MM protocol and thus secure against
man-in-the-middle attacks.
KEYWORDS
IoT, MAC, authentication,
lightweight protocol, Xor-Cascade Encryption
Source URL
Comments
Post a Comment