Browse > Article
http://dx.doi.org/10.7840/kics.2015.40.10.1969

Lightweight DTLS Message Authentication Based on a Hash Tree  

Lee, Boo-Hyung (Dept. of Computer Science & Engineering, Sangmyung University)
Lee, Sung-Bum (Dept. of Computer Science & Engineering, Sangmyung University)
Moon, Ji-Yeon (Dept. of Computer Science & Engineering, Sangmyung University)
Lee, Jong-Hyouk (Dept. of Computer Science & Engineering, Sangmyung University)
Abstract
The Internet of Things (IoT), in which resource constrained devices communicate with each other, requires a lightweight security protocol. In this paper, we propose a new message authentication scheme using a hash tree for lightweight message authentication in the Datagram Transport Layer Security (DTLS) protocol. The proposed scheme provides lightweight secure operations compared with those of the DTLS protocol. Besides, it provides more suitable performance than the DTLS protocol for an IoT environment, thanks to the reduced use of message authentication code.
Keywords
Hash Tree; DTLS; Authentication; Network; Lightweight;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 J. Park and N. Kang, "Entity authentication scheme for secure WEB of things applications," J. KICS, vol. 38B, no. 05, pp. 394-400, May 2013.   DOI
2 E. Rescorla and N. Modadugu, Datagram Transport Layer Security Version 1.2, IETF RFC 6347, Jan. 2012.
3 J. Park, S. Shin, and N. Kang, "Mutual authentication and key agreement scheme between lightweight devices in internet of things," J. KICS, vol. 38B, no. 09, pp. 707-714, Sept. 2013.   DOI
4 T. Dierks and E. Rescorla, The Transport Layer Security Protocol Version 1.2, IETF RFC 5246, Aug. 2008.
5 M.-H. Park, C.-K. Lee, J.-H. Son, and S.-W. Seo, "Efficient security mechanism using light-weight data origin authentication in sensor network," J. KICS, vol. 32, no. 05, pp. 402-408, May 2007.
6 Y. Hu, A. Perrig, and D. B. Johnson, "Efficient security mechanisms for routing protocols," in Proc. NDSS'03, Feb. 2003.
7 D. Eastlake and P. Jones, US Secure Hash Algorithm 1(SHA1), IETF RFC 3174, Sept. 2001.
8 F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Int. Workshop Veh. Ad Hoc Netw., Sept. 2005.
9 H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104, Feb 1997.
10 I. Ishaq, D. Carels, G. Teklemariam, J. Hoebeke, F. Abeele, E. Poorter, I. Moerman, and P. Demeester, "IETF standardization in the field of the internet of things (IoT): A survey," J. Sensor and Actuator Networks, vol. 2, no. 2, pp. 235-287, Apr. 2013.   DOI
11 H. R. Lee, K.-H. Jung, and Y.-J. Suh, "Contention/Collision mitigation scheme in IEEE 802.15.4 mesh sensor networks," J. KICS, vo1. 38C, no. 08, pp. 683-691, Sept. 2013.   DOI