Browse > Article
http://dx.doi.org/10.9708/jksci.2019.24.04.011

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication  

Lee, Wan Yeon (Dept. of Computer Science, Dongduk Women's University)
Abstract
Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.
Keywords
Ultra-lightweight; IoT; Steganography communication; Mutual authentication; Integrity;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Seon-Keun Lee, "A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment," Journal of the Korea Academia-Industrial Cooperation Society, vol. 19, no. 3, pp. 1-7, 2018.   DOI
2 National Institute of Standards and Technology (NIST), "Advanced Encryption Standards (AES)," Federal Information Processing Standards Publication 197, pp. 1-26, Nov. 2001.
3 T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann and L. Uhsadel, "A Survey of Lightweight-Cryptography Implementations," IEEE Design & Test of Computers, vol. 24, no. 6, pp. 522-533, Nov.-Dec. 2007.   DOI
4 Gi-tae Park, Hyo-joon Han and Jae-hwoon Lee, "Design and Implementation of Lightweight Encryption Algorithm on OpenSSL," The Journal of Korean Institute of Communications and Information Sciences, vol. 39B, no. 12, pp. 822-830, 2014.
5 Wan Yeon Lee, "Performance Evaluation of Lightweight Security Algorithms for Embedded Systems with Low Capacity," Dongduk Journal of Natural Science and Computer Science, vol. 3, pp. 71-80, Dec. 2018.
6 Geum-Boon Lee, "A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits," Journal of the Korea Society of Computer and Information, vol. 22, no. 9, pp. 65-71, Sep. 2017.   DOI
7 Seokhyang Cho, "An Efficient Group Key Agreement Using Hierarchical Key Tree in Mobile Environment," Journal of the Korea Society of Computer and Information, vol. 23, no. 2, pp. 53-61, Feb. 2018.   DOI
8 Prem Singh, Rajat Chaudhary and Ambika Agarwal, "A Novel Approach of Text Steganography based on Null Space," IOSR Journal of Computer Engineering, vol. 3, no. 4, pp. 11-17, July-Aug. 2012.   DOI
9 Hwa-Jeong Seo, Tae-Hwan Park and Ga-Ram Lee, "Implementation Technique of Symmetric-Key Cryptography on Lightweight IoT Platforms," Korea Institute of Information Security and Cryptology, vol. 27, no. 6, pp. 15-20, Dec. 2017.   DOI
10 William Stalling, Cryptography and Network Security: Principles and Practices (6th Edition), Prentice Hall, 2013.
11 Rene Hummen, Jan H. Ziegeldorf, Hossein Shafagh, Shahid Raza and Klaus Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things," ACM HotWiSec, pp. 54-63, April 2013.
12 Wan Yeon Lee and Yun-Seok Choi, "Optimization of ARIA Block-Cipher Algorithm for Embedded Systems with 16-bits Processors," International Journal of Internet, Broadcasting and Communication, vol. 8, no. 1, pp. 88-98, Feb. 2016.
13 M. Ebrahim, S. Khan and U. B. Khalid, "Symmetric Algorithm Survey: A Comparative Analysis," International Journal of Computer Applications, vol. 61, no. 20, pp. 12-19, Jan. 2013.
14 S. B. Sasi and N. Sivan, "A Survey on Cryptography Using Optimization Algorithms in WSNs," Indian Journal of Science and Technology, vol. 8, no. 3, pp. 216-221, Feb. 2015.
15 Y. W. Law, J. Doumen and P. Hartel, "Survey and Benchmark of Block Cipher for Wireless Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, Feb. 2006.   DOI
16 Meikang Qiu, Hai Su, Min Chen, Zhong Ming, and Laurence T. Yang, "Balance of Security Strength and Energy for PMU Monitoring Systems in Smart Grid," IEEE Communications Magazine, vol. 50, no. 5, pp. 142-149, May 2012.   DOI