Skip to main content

Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13291))

Included in the following conference series:

Abstract

This paper investigates the performance of three lightweight authenticated ciphers namely ACE, SPIX and WAGE in the WiFi and CoAP handshaking authentication protocols. We implement the WiFi and CoAP handshake protocols and the IEEE802.11a physical layer communication protocol in software defined radio (SDR) and embed these two handshaking protocols into the IEEE802.11a OFDM communication protocol to measure the performance of three ciphers. We present the construction of KDF and MIC used in the handshaking authentication protocols and provide optimized implementations of ACE, SPIX and WAGE including KDF and MIC on three different (low-power) microcontrollers. The performance results of these three ciphers when adopted in WiFi and CoAP protocols are presented. Our experimental results show that the cryptographic functionalities are the bottleneck in the handshaking and data protection protocols.

Yunjie Yi is now with Huawei Canada, Waterloo and the work was done when he was with University of Waterloo.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. 5G PPP: 5G PPP phase1 security landscape. In: 5G PPP Security WG, European Commission, June 2017

    Google Scholar 

  2. Aagaard, M., AlTawy, R., Gong, G., Mandal, K., Rohit, R.: ACE: an authenticated encryption and hash algorithm. NIST LWC Round 2. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/ace-spec-round2.pdf

  3. Aagaard, M., AlTawy, R., Gong, G., Mandal, K., Rohit, R., Zidaric, N.: WAGE: an authenticated cipher, NIST LWC round 2 (2019). https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/wage-spec-round2.pdf

  4. Alliance, L.: (2021). https://lora-alliance.org/

  5. AlTawy, R., Gong, G., He, M., Mandal, K., Rohit, R.: SPIX: an authenticated cipher, NIST LWC round 2. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/round-2/spec-doc-rnd2/spix-spec-round2.pdf

  6. Altawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G.: sLiSCP-light: towards hardware optimized sponge-specific cryptographic permutations. ACM Trans. Embed. Comput. Syst. 17(4), 81:1–81:26 (2018). https://doi.org/10.1145/3233245. http://doi.acm.org/10.1145/3233245

  7. AlTawy, R., Rohit, R., He, M., Mandal, K., Yang, G., Gong, G.: sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives. In: Adams, C., Camenisch, J. (eds.) SAC 2017. LNCS, vol. 10719, pp. 129–150. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72565-9_7

    Chapter  Google Scholar 

  8. Arslan, H., Mitola, J., III.: Cognitive radio, software-defined radio, and adaptive wireless systems. Wirel. Commun. Mob. Comput. 7(9), 1033–1035 (2007)

    Article  Google Scholar 

  9. Bassham, L., Calik, C., Chang, D., Kang, J., McKay, K., Turan, M.: Lightweight cryptography (2019). https://csrc.nist.gov/projects/lightweight-cryptography/round-2-candidates

  10. Bassham, L., Calik, C., Chang, D., Kang, J., McKay, K., Turan, M.: Lightweight cryptography - finalists (2021). https://csrc.nist.gov/Projects/lightweight-cryptography/finalists

  11. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28496-0_19

    Chapter  Google Scholar 

  12. Bloessl, B., Segata, M., Sommer, C., Dressler, F.: Performance assessment of IEEE 802.11P with an open source SDR-based prototype. IEEE Trans. Mob. Comput. 17(5), 1162–1175 (2018). https://doi.org/10.1109/TMC.2017.2751474

    Article  Google Scholar 

  13. Chen, L., Gong, G.: Communication System Security. Chapman and Hall/CRC, London (2012)

    Book  Google Scholar 

  14. Congdon, P., Aboba, B., Smith, A., Zorn, G., Roese, J.: IEEE 802.1 x remote authentication dial in user service (radius) usage guidelines. RFC 3580, pp. 1–30 (2003)

    Google Scholar 

  15. Group, I.W., et al.: 802.11ax - IEEE draft standard for information technology - telecommunications and information exchange between systems local and metropolitan area networks. IEEE STD (2019)

    Google Scholar 

  16. Hamdane, B., Serhrouchni, A., Montfaucon, A., Guemara, S.: Using the HMAC-based one-time password algorithm for TLS authentication. In: 2011 Conference on Network and Information Systems Security, pp. 1–8, May 2011. https://doi.org/10.1109/SAR-SSI.2011.5931396

  17. Khorov, E., Kiryanov, A., Lyakhov, A., Bianchi, G.: A tutorial on IEEE 802.11ax high efficiency WLANs. IEEE Commun. Surv. Tutor. 21(1), 197–216 (2019)

    Google Scholar 

  18. Kim, D., Jung, J., Koo, Y., Yi, Y.: Bird-MAC: energy-efficient mac for quasi-periodic IoT applications by avoiding early wake-up. IEEE Trans. Mob. Comput. 19(4), 788–802 (2020)

    Article  Google Scholar 

  19. Li, J., Zhang, N., Ni, J., Chen, J., Du, R.: Secure and lightweight authentication with key agreement for smart wearable systems. IEEE Internet Things J. 7(8), 7334–7344 (2020)

    Article  Google Scholar 

  20. Li, P., Su, J., Wang, X.: iTLS: lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy. IEEE Internet Things J. 7(8), 6828–6841 (2020)

    Article  Google Scholar 

  21. Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. In: 2008 International Symposium on Industrial Embedded Systems, pp. 58–66, June 2008. https://doi.org/10.1109/SIES.2008.4577681

  22. Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in CoAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7, March 2016. https://doi.org/10.1109/ICBDSC.2016.7460363

  23. Schmidl, T.M., Cox, D.C.: Robust frequency and timing synchronization for OFDM. IEEE Trans. Commun. 45(12), 1613–1621 (1997). https://doi.org/10.1109/26.650240

    Article  Google Scholar 

  24. ISO/IEC 20922:2016 [ISO/IEC 20922:2016] information technology - message queuing telemetry transport (MQTT) v3.1.1. https://www.iso.org/standard/69466.html

  25. Vollbrecht, J., Aboba, B., Blunk, L., Levkowetz, H., Carlson, J.: Extensible authentication protocol (EAP) (2004)

    Google Scholar 

  26. Wang, L., An, H., Zhu, H., Liu, W.: Mobikey: mobility-based secret key generation in smart home. IEEE Internet Things J. 7(8), 7590–7600 (2020)

    Article  Google Scholar 

  27. Ye, Q., Zhuang, W.: Distributed and adaptive medium access control for internet-of-things-enabled mobile networks. IEEE Internet Things J. 4(2), 446–460 (2017)

    Article  Google Scholar 

  28. Yi, Y., Gong, G., Mandal, K.: Implementation of three LWC schemes in the WiFi 4-way handshake with software defined radio (2021). https://arxiv.org/pdf/1909.11707.pdf

  29. Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (COAP). RFC 7252 (2014). https://tools.ietf.org/pdf/rfc7252.pdf

Download references

Acknowledgement

The research of Yunjie Yi and Guang Gong, and partial work of Kalikinkar Mandal were supported by NSERC SPG and Discovery Grants. The authors would like to thank the reviewers for their insightful comments to improve the quality of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kalikinkar Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yi, Y., Mandal, K., Gong, G. (2022). Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission. In: Aïmeur, E., Laurent, M., Yaich, R., Dupont, B., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2021. Lecture Notes in Computer Science, vol 13291. Springer, Cham. https://doi.org/10.1007/978-3-031-08147-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08147-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08146-0

  • Online ISBN: 978-3-031-08147-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics