Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.4.729

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks  

Lee, Jong-kwan (Department of Computer Science, Korea Military Academy)
Abstract
In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.
Keywords
Authentication Protocol; Unmanned Systems; Hash Collision; Tactical Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Stallings and L. Brown, "Computer Security: principal and practice," 3rd Ed., pearson, 2014.
2 L. Reyzin, N. Reyzin "Better than BiBa: short one-time signatures with fast signing and verifying," Proceedings of the 7th Australian Conference on Information Security and Privacy, London, UK, pp. 144-153, 2002.
3 Josef Pieprzyk, Huaxiong Wang, and Chaoping Xing, "Multiple-time signature schemes against adaptive chosen message attacks," International Workshop on Selected Areas in Cryptography, Springer, pp. 88-100, 2003.
4 J. Lee, S. Kim, Y. Cho, Y. Chung, Y. Park, "HORSIC: an efficient onetime signature scheme for wireless sensor networks," Inform. Processing Letters, vol. 112, pp. 783-787, 2012.   DOI
5 L. Eschenuer, V. D. Gligor, "A key-management scheme for distributed sensor networks," Proceedings of the 9th ACM conference on computer and communications security, pp.41-47, Nov. 2002.
6 W. Du, J. Deng, Y. S. Han, P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 62-77, 2006.   DOI
7 S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sen. Netw., vol. 2, pp. 500-528, 2006.   DOI
8 J. Jang, T. Kwon, J. Song, "A time-based key management protocol for wireless sensor networks," Proceedings of ISPEC, LNCS 4464, pp. 314-328, 2007.
9 S. Nesteruk, S. Bezzateev, "Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure," Proceeding of the 22nd FRUCT Association, pp. 190-197, 2018.
10 P. Vijayakumar, M. Azees, A. Kannan and L. Jegatha Deborah, "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks," IEEE Transaction on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1015-1028, April 2016.   DOI
11 Yavuz, A.A. "An efficient real-time broadcast authentication scheme for command and control messages," IEEE Transactions on Information Forensic and Security, vol. 9, no. 10, pp. 1733-174, 2014.   DOI
12 Jin Sook Bong, Yu Hwa Suh, Ui Jin Jang and Yongtae Shin, "RSU-independent Message Authentication Scheme using CRT-based Group Key in VANET," Journal of KIISE, Vol. 46, No. 3, pp. 277-284, 2019.   DOI
13 Bamasag, Omaimah Omar, and Kamal Youcef-Toumi, "Towards continuous authentica-tion in internet of things based on secret sharing scheme," Proceedings of the WESS'15: Workshop on Embedded Systems Security, pp. 1-8, 2015.
14 Xiao, J. andChen, C., "Authentication and Access Control in the Internet of Things," Proceedings of 32nd International Conference on Distributed Computing Systems Workshops, pp. 588-592, 2012.