skip to main content
10.1145/3220192.3220458acmconferencesArticle/Chapter ViewAbstractPublication PageshpdcConference Proceedingsconference-collections
research-article

Lightweight Authentication for Fault-Tolerant Topic-Channels in Ad Hoc Distributed Systems

Published:11 June 2018Publication History

ABSTRACT

Many distributed systems assume participants are both performant and secure, characteristics offered by many cloud-based systems. However, scaling distributed techniques down to highly resource-or power-constrained contexts may require alternative approaches. One such context is the deployment of ad hoc distributed systems in insecure or uncontrolled areas, for example during disaster response activities. Providing reliable and secure service is exacerbated by the computational and power constraints imposed on these devices. In this work, we first introduce the concept of on-demand topic-channels. Then, we describe three message authentication protocols which provide secure, authenticated communication between participants and a coordinator, while also providing resilience from adversarial or accidental disruption. We leverage homomorphic hashing primitives to trade message secrecy against communication and computational costs. Finally, we assess these protocols, and show that our hash-based protocols provide significant efficiency improvements over traditional encryption-based approaches.

References

  1. M Bellare and D Micciancio. 1997. A new paradigm for collision-free hashing: Incrementality at reduced cost. In EUROCRYPT '97. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. O Delgado-Mohatar, A Fúster-Sabater, and JM Sierra. 2011. A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Benjamin Heintz, Abhishek Chandra, and Ramesh K Sitaraman. 2015. Optimizing grouped aggregation in geo-distributed streaming analytics. In International Symposium on High-Performance Parallel and Distributed Computing (HPDC). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Y Hu, A Perrig, and DB Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless networks 11, 1--2 (2005), 21--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. MN Krohn, MJ Freedman, and D Mazieres. 2004. On-the-fly verification of rateless erasure codes for efficient content distribution. In Security and Privacy (S&P).Google ScholarGoogle Scholar
  6. Jeremy Maitin-Shepard, Mehdi Tibouchi, and Diego F Aranha. 2016. Elliptic curve multiset hash. Comput. J. 60, 4 (2016), 476--490.Google ScholarGoogle Scholar
  7. GCCF Pereira, RCA Alves, F Silva, RM Azevedo, BC Albertini, and CB Margi. 2017. Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Security and Communication Networks (2017).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    HPDC '18: Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing
    June 2018
    25 pages
    ISBN:9781450358996
    DOI:10.1145/3220192

    Copyright © 2018 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 11 June 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate166of966submissions,17%

    Upcoming Conference

  • Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader