Integrity (I) codes: message integrity protection and authentication over insecure channels
- 1 January 2006
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 15 pp.-294
- https://doi.org/10.1109/sp.2006.23
Abstract
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit "0" into a bit "1", but not the contrary), we propose integrity codes (I-codes) for a radio communication channel, which enable integrity protection of messages exchanged between entities that do not hold any mutual authentication material (i.e. public keys or shared secret keys). The construction of I-codes enables a sender to encode any message such that if its integrity is violated in transmission over a radio channel, the receiver is able to detect it. In order to achieve this, we rely on the physical properties of the radio channel. We analyze in detail the use of I-codes on a radio communication channel and we present their implementation on a Mica2 wireless sensor platform as a "proof of concept". We finally introduce a novel concept called "authentication through presence" that can be used for several applications, including for key establishment and for broadcast authentication over an insecure radio channel. We perform a detailed analysis of the security of our coding scheme and we show that it is secure with respect to a realistic attacker modelKeywords
This publication has 13 references indexed in Scilit:
- Key Agreement in Peer-to-Peer Wireless NetworksProceedings of the IEEE, 2006
- Mobility helps peer-to-peer securityIEEE Transactions on Mobile Computing, 2005
- Security for Ubiquitous ComputingPublished by Wiley ,2002
- Selecting Cryptographic Key SizesJournal of Cryptology, 2001
- Key agreement in ad hoc networksComputer Communications, 2000
- On t-error correcting/all unidirectional error detecting codesIEEE Transactions on Computers, 1989
- A Digital Signature Based on a Conventional Encryption FunctionLecture Notes in Computer Science, 1988
- Data Integrty in Digital Optical DisksIEEE Transactions on Computers, 1984
- Key exchange using ‘keyless cryptography’Information Processing Letters, 1983
- Optimal asymmetric error detecting codesInformation and Control, 1982