Browse > Article
http://dx.doi.org/10.3837/tiis.2020.09.016

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems  

Lee, Jongkwan (Department of Computer Science, Korea Military Academy)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.9, 2020 , pp. 3858-3869 More about this Journal
Abstract
In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.
Keywords
Mutual Identification Protocol; Hash-Chain; Friendly Force Identification; Tactical Wireless Networks; Personal Combat System;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Lijia Chen, Jintao Xiong, Liangchao Li, Zongjie Cao, and Jianyu Yang, "Research on a novel method for identification friend or foe based on fuzzy c-means and dynamic Bayesian network," in Proc. of 2011 IEEE CIE International Conference on Radar, pp. 1656-1659, 2011.
2 El-hajj, M. Chamoun, A. Fadlallah, and A. Serhrouchni, "Analysis of authentication techniques in Internet of Things (IoT)," in Proc. of 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1-3, 2017.
3 Chang and H. Le, "A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks," IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 357-366, Jan. 2016.   DOI
4 Rasheed and R. N. Mahapatra, "The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 5, pp. 958-965, May 2012.   DOI
5 E. A. M. Anita and J. Jenefa, "A survey on authentication schemes of VANETs," in Proc. of 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1-7, 2016.
6 Meddeb-Makhlouf, N. Meddeb and M. A. B. Ayed, "An Enhanced Multilevel Authentication Protocol for VANETs," in Proc. of 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1232-1238, 2017.
7 S. V. Nesteruk, V. Y. Kovalenko, and S. V. Bezzateev, "A Survey on Localized Authentication Protocols for Wireless Sensor Networks," in Proc. of 2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), pp. 1-7, 2018.
8 Liu, Jing, Yang Xiao, and CL Philip Chen, "Authentication and access control in the internet of things," in Proc. of IEEE 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 588-592, 2012.
9 K.H. Lee and J.S Lee, "Mutual authentication method for hash chain based sensors in IoT environment," Journal of the Korea Academia-Industrial cooperation Society, vol. 19, No. 11, pp. 303-309, 2018.   DOI
10 Bamasag, Omaimah Omar, and Kamal Youcef-Toumi, "Towards continuous authentication in internet of things based on secret sharing scheme," in Proc. of the WESS'15: Workshop on Embedded Systems Security, pp. 1-8, 2015.
11 H. Liu, Y. Chen, H. Tian, T. Wang, and Y. Cai, "A novel secure message delivery and authentication method for vehicular ad hoc networks," in Proc. of 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), pp. 135-139, 2016.
12 P. Vijayakumar, M. Azees, A. Kannan, and L. Jegatha Deborah, "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1015-1028, April 2016.   DOI
13 A. Perrig, R. Canetti, J. D. Tygar, and Dawn Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. of 2000 IEEE Symposium on Security and Privacy, pp. 56-73, 2000.
14 M. Younis, O. Farrag, and B. Althouse, "TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks," IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 100-113, March 2012.   DOI
15 Lamport, Leslie, "Password authentication with insecure communication," Communications of the ACM vol. 24, no. 11, pp. 770-772, 1981.   DOI