DOI QR코드

DOI QR Code

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon (Dept. of Computer Science, Dongduk Women's University)
  • Received : 2019.02.08
  • Accepted : 2019.04.08
  • Published : 2019.04.30

Abstract

Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.

Keywords

CPTSCQ_2019_v24n4_11_f0001.png 이미지

Fig. 1. Comparison of cipher communication and steganography communication

CPTSCQ_2019_v24n4_11_f0002.png 이미지

Fig. 2. Working example of the proposed text steganography communication

CPTSCQ_2019_v24n4_11_f0003.png 이미지

Fig. 3. Communication protocol of the proposed mutual authentication

CPTSCQ_2019_v24n4_11_f0004.png 이미지

Fig. 4. Implemented client device

CPTSCQ_2019_v24n4_11_f0005.png 이미지

Fig. 5. Android App of implemented server device

CPTSCQ_2019_v24n4_11_f0006.png 이미지

Fig. 6. Authentication failure of sever device

CPTSCQ_2019_v24n4_11_f0007.png 이미지

Fig. 7. Authentication failure of client device

References

  1. Wan Yeon Lee and Yun-Seok Choi, "Optimization of ARIA Block-Cipher Algorithm for Embedded Systems with 16-bits Processors," International Journal of Internet, Broadcasting and Communication, vol. 8, no. 1, pp. 88-98, Feb. 2016.
  2. M. Ebrahim, S. Khan and U. B. Khalid, "Symmetric Algorithm Survey: A Comparative Analysis," International Journal of Computer Applications, vol. 61, no. 20, pp. 12-19, Jan. 2013.
  3. S. B. Sasi and N. Sivan, "A Survey on Cryptography Using Optimization Algorithms in WSNs," Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216-221, Feb. 2015.
  4. Y. W. Law, J. Doumen and P. Hartel, "Survey and Benchmark of Block Cipher for Wireless Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, Feb. 2006. https://doi.org/10.1145/1138127.1138130
  5. Meikang Qiu, Hai Su, Min Chen, Zhong Ming, and Laurence T. Yang, "Balance of Security Strength and Energy for PMU Monitoring Systems in Smart Grid," IEEE Communications Magazine, vol. 50, no. 5, pp. 142-149, May 2012. https://doi.org/10.1109/MCOM.2012.6194395
  6. Rene Hummen, Jan H. Ziegeldorf, Hossein Shafagh, Shahid Raza and Klaus Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things," ACM HotWiSec, pp. 54-63, April 2013.
  7. William Stalling, Cryptography and Network Security: Principles and Practices (6th Edition), Prentice Hall, 2013.
  8. National Institute of Standards and Technology (NIST), "Advanced Encryption Standards (AES)," Federal Information Processing Standards Publication 197, pp. 1-26, Nov. 2001.
  9. T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann and L. Uhsadel, "A Survey of Lightweight-Cryptography Implementations," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 522-533, Nov.-Dec. 2007. https://doi.org/10.1109/MDT.2007.178
  10. Gi-tae Park, Hyo-joon Han and Jae-hwoon Lee, "Design and Implementation of Lightweight Encryption Algorithm on OpenSSL," The Journal of Korean Institute of Communications and Information Sciences, vol. 39B, no. 12, pp. 822-830, 2014.
  11. Wan Yeon Lee, "Performance Evaluation of Lightweight Security Algorithms for Embedded Systems with Low Capacity," Dongduk Journal of Natural Science and Computer Science, vol. 3, pp. 71-80, Dec. 2018.
  12. Geum-Boon Lee, "A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits," Journal of the Korea Society of Computer and Information, vol. 22, no. 9, pp. 65-71, Sep. 2017. https://doi.org/10.9708/JKSCI.2017.22.09.065
  13. Seokhyang Cho, "An Efficient Group Key Agreement Using Hierarchical Key Tree in Mobile Environment," Journal of the Korea Society of Computer and Information, vol. 23, no. 2, pp. 53-61, Feb. 2018. https://doi.org/10.9708/JKSCI.2018.23.02.053
  14. Prem Singh, Rajat Chaudhary and Ambika Agarwal, "A Novel Approach of Text Steganography based on Null Space," IOSR Journal of Computer Engineering, vol. 3, no. 4, pp. 11-17, July-Aug. 2012. https://doi.org/10.9790/0661-0341117
  15. Hwa-Jeong Seo, Tae-Hwan Park and Ga-Ram Lee, "Implementation Technique of Symmetric-Key Cryptography on Lightweight IoT Platforms," Korea Institute of Information Security and Cryptology, vol. 27, no. 6, pp. 15-20, Dec. 2017. https://doi.org/10.13089/JKIISC.2017.27.1.15
  16. Seon-Keun Lee, "A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment," Journal of the Korea Academia-Industrial Cooperation Society, vol. 19, no. 3, pp. 1-7, 2018. https://doi.org/10.5762/KAIS.2018.19.3.1