Abstract
In this research, the authors propose a functionality based on message authentication code (MAC) to ensure the correctness of its path from a source to a destination. It aims to use a controller area network (CAN) over driving system. In the construction, MAC and a pseudorandom number generator having an intentional group structure are employed so that the correct user can authenticate a message and its path. The proposed method is experimentally evaluated by observing the computational time over IoT devices. As a result, it is found that the results show that it is possible to implement as an additional function that gives path authentication with additional time at most 3 times for the corresponding computation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ISO 11898–1:2015: Road vehicles - Controller area network (CAN) - Part 1: Data link layer and physical signalling. ISO, Geneva, Switzerland
ISO/IEC DIS 29192–6:2019: Information technology - Security techniques - Lightweight cryptography - Part 6: Message authentication codes (MACs). ISO, Geneva, Switzerland
Barker, E., Kelsey, J.: Recommendation for random number generation using deterministic random bit generators. NIST, SP 800–90A, Revision 1 (2015). https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final. Accessed 22 Apr 2019
Mouha, N., Mennink, B., Herrewege, A.V., Watanabe, D., Preneel, B., Verbauwhede, I.: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers. Cryptology ePrint Archive, Report 2014/386. https://eprint.iacr.org/2014/386. Accessed 23 Aug 2020
Carel, G., Isshiki, R., Kusaka, T., Nogami, Y.: Design of a message authentication protocol for CAN FD based on chaskey lightweight MAC. In: Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp. 267–271. CPS, Hida Takayama (2018)
Golić, J.D.: On the security of nonlinear filter generators. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 173–188. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-60865-6_52
Golomb, S.W.: Shift Register Sequences. Holden-Day, San Francisco (1967)
Murase, M.: Linear Feedback Shift Register. European Patent Application (1991)
Arduino. https://www.arduino.cc. Accessed 23 Aug 2020
Raspberry Pi 3A+. https://www.raspberrypi.org/products. Accessed 23 Aug 2020
Weatherley, R.: Arduino Cryptography Library. https://rweather.github.io/arduinolibs. Accessed 23 Aug 2020
Acknowledgment
This work was partially supported by the JSPS KAKENHI Grant-in-Aid for Challenging Research (Pioneering) JP20K20484 and Grant-in-Aid for Research Activity Start-up JP20K23327.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Taketa, Y., Kodera, Y., Kusaka, T., Nogami, Y. (2021). Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator. In: Park, Y., Jadav, D., Austin, T. (eds) Silicon Valley Cybersecurity Conference. SVCC 2020. Communications in Computer and Information Science, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-72725-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-72725-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72724-6
Online ISBN: 978-3-030-72725-3
eBook Packages: Computer ScienceComputer Science (R0)