Abstract
This paper investigates the performance of three lightweight authenticated ciphers namely ACE, SPIX and WAGE in the WiFi and CoAP handshaking authentication protocols. We implement the WiFi and CoAP handshake protocols and the IEEE802.11a physical layer communication protocol in software defined radio (SDR) and embed these two handshaking protocols into the IEEE802.11a OFDM communication protocol to measure the performance of three ciphers. We present the construction of KDF and MIC used in the handshaking authentication protocols and provide optimized implementations of ACE, SPIX and WAGE including KDF and MIC on three different (low-power) microcontrollers. The performance results of these three ciphers when adopted in WiFi and CoAP protocols are presented. Our experimental results show that the cryptographic functionalities are the bottleneck in the handshaking and data protection protocols.
Yunjie Yi is now with Huawei Canada, Waterloo and the work was done when he was with University of Waterloo.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
5G PPP: 5G PPP phase1 security landscape. In: 5G PPP Security WG, European Commission, June 2017
Aagaard, M., AlTawy, R., Gong, G., Mandal, K., Rohit, R.: ACE: an authenticated encryption and hash algorithm. NIST LWC Round 2. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/ace-spec-round2.pdf
Aagaard, M., AlTawy, R., Gong, G., Mandal, K., Rohit, R., Zidaric, N.: WAGE: an authenticated cipher, NIST LWC round 2 (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/wage-spec-round2.pdf
Alliance, L.: (2021). https://lora-alliance.org/
AlTawy, R., Gong, G., He, M., Mandal, K., Rohit, R.: SPIX: an authenticated cipher, NIST LWC round 2. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/spix-spec-round2.pdf
Altawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G.: sLiSCP-light: towards hardware optimized sponge-specific cryptographic permutations. ACM Trans. Embed. Comput. Syst. 17(4), 81:1–81:26 (2018). https://doi.org/10.1145/3233245. http://doi.acm.org/10.1145/3233245
AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G.: sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives. In: Adams, C., Camenisch, J. (eds.) SAC 2017. LNCS, vol. 10719, pp. 129–150. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72565-9_7
Arslan, H., Mitola, J., III.: Cognitive radio, software-defined radio, and adaptive wireless systems. Wirel. Commun. Mob. Comput. 7(9), 1033–1035 (2007)
Bassham, L., Calik, C., Chang, D., Kang, J., McKay, K., Turan, M.: Lightweight cryptography (2019). https://csrc.nist.gov/projects/lightweight-cryptography/round-2-candidates
Bassham, L., Calik, C., Chang, D., Kang, J., McKay, K., Turan, M.: Lightweight cryptography - finalists (2021). https://csrc.nist.gov/Projects/lightweight-cryptography/finalists
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28496-0_19
Bloessl, B., Segata, M., Sommer, C., Dressler, F.: Performance assessment of IEEE 802.11P with an open source SDR-based prototype. IEEE Trans. Mob. Comput. 17(5), 1162–1175 (2018). https://doi.org/10.1109/TMC.2017.2751474
Chen, L., Gong, G.: Communication System Security. Chapman and Hall/CRC, London (2012)
Congdon, P., Aboba, B., Smith, A., Zorn, G., Roese, J.: IEEE 802.1 x remote authentication dial in user service (radius) usage guidelines. RFC 3580, pp. 1–30 (2003)
Group, I.W., et al.: 802.11ax - IEEE draft standard for information technology - telecommunications and information exchange between systems local and metropolitan area networks. IEEE STD (2019)
Hamdane, B., Serhrouchni, A., Montfaucon, A., Guemara, S.: Using the HMAC-based one-time password algorithm for TLS authentication. In: 2011 Conference on Network and Information Systems Security, pp. 1–8, May 2011. https://doi.org/10.1109/SAR-SSI.2011.5931396
Khorov, E., Kiryanov, A., Lyakhov, A., Bianchi, G.: A tutorial on IEEE 802.11ax high efficiency WLANs. IEEE Commun. Surv. Tutor. 21(1), 197–216 (2019)
Kim, D., Jung, J., Koo, Y., Yi, Y.: Bird-MAC: energy-efficient mac for quasi-periodic IoT applications by avoiding early wake-up. IEEE Trans. Mob. Comput. 19(4), 788–802 (2020)
Li, J., Zhang, N., Ni, J., Chen, J., Du, R.: Secure and lightweight authentication with key agreement for smart wearable systems. IEEE Internet Things J. 7(8), 7334–7344 (2020)
Li, P., Su, J., Wang, X.: iTLS: lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy. IEEE Internet Things J. 7(8), 6828–6841 (2020)
Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. In: 2008 International Symposium on Industrial Embedded Systems, pp. 58–66, June 2008. https://doi.org/10.1109/SIES.2008.4577681
Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7, March 2016. https://doi.org/10.1109/ICBDSC.2016.7460363
Schmidl, T.M., Cox, D.C.: Robust frequency and timing synchronization for OFDM. IEEE Trans. Commun. 45(12), 1613–1621 (1997). https://doi.org/10.1109/26.650240
ISO/IEC 20922:2016 [ISO/IEC 20922:2016] information technology - message queuing telemetry transport (MQTT) v3.1.1. https://www.iso.org/standard/69466.html
Vollbrecht, J., Aboba, B., Blunk, L., Levkowetz, H., Carlson, J.: Extensible authentication protocol (EAP) (2004)
Wang, L., An, H., Zhu, H., Liu, W.: Mobikey: mobility-based secret key generation in smart home. IEEE Internet Things J. 7(8), 7590–7600 (2020)
Ye, Q., Zhuang, W.: Distributed and adaptive medium access control for internet-of-things-enabled mobile networks. IEEE Internet Things J. 4(2), 446–460 (2017)
Yi, Y., Gong, G., Mandal, K.: Implementation of three LWC schemes in the WiFi 4-way handshake with software defined radio (2021). https://arxiv.org/pdf/1909.11707.pdf
Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (COAP). RFC 7252 (2014). https://tools.ietf.org/pdf/rfc7252.pdf
Acknowledgement
The research of Yunjie Yi and Guang Gong, and partial work of Kalikinkar Mandal were supported by NSERC SPG and Discovery Grants. The authors would like to thank the reviewers for their insightful comments to improve the quality of the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Yi, Y., Mandal, K., Gong, G. (2022). Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission. In: Aïmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https://doi.org/10.1007/978-3-031-08147-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-08147-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08146-0
Online ISBN: 978-3-031-08147-7
eBook Packages: Computer ScienceComputer Science (R0)