Efficient and secure message authentication algorithm at the physical layer

  • Hassan N. Noura
  • , Reem Melki*
  • , Ali Chehab
  • , Javier Hernandez Fernandez
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

Message authentication, which refers to source authentication and message integrity, is an essential security service, especially in emerging networks such as peer-to-peer, Device-to-Device, LPWAN (such as NB-IoT, LTE-M or SigFox) and vehicle to vehicle. Traditionally, message authentication schemes handled at upper layers of the protocol stack. Such schemes require multiple rounds and multiple operations per round, which results in a considerable overhead in terms of latency and required resources. Recently, many research works have shifted towards investigating the design of new security solutions at the physical layer (PLS). Although data confidentiality and device authentication schemes have been introduced at the physical layer, yet, no PLS message authentication scheme has been presented. In this paper, we propose a dynamic message authentication algorithm (keyed hash function) that makes use of a secret session key in addition to the random characteristics of the physical channel. Moreover, the cryptographic primitives are dynamic and get updated in a lightweight manner for every input frame symbol. Security and performance analysis were conducted to validate the efficiency and robustness of the proposed scheme. The results confirmed that the proposed authentication scheme exhibits a high level of security with minimum overhead in terms of delay.

Original languageEnglish
Pages (from-to)6291-6305
Number of pages15
JournalWireless Networks
Volume30
Issue number7
Early online dateJun 2020
DOIs
Publication statusPublished - Oct 2024

Keywords

  • Data integrity and source authentication
  • Lpwan
  • Physical layer hash function
  • Security and performance analysis

Fingerprint

Dive into the research topics of 'Efficient and secure message authentication algorithm at the physical layer'. Together they form a unique fingerprint.

Cite this