Beyond Traditional Message Authentication Codes: Future Solutions for Efficient Authentication of Message Streams in IoT Networks. Bansal, G. & Sikdar, B. IEEE Internet of Things Magazine, IEEE, Revision. abstract bibtex One of the significant challenges of secure communication in resource-constrained environments is the overhead of integrity protection. The tags of traditional Message Authentication Code (MAC) schemes (e.g., HMAC) occupy most of the total payload. This led to the rise of innovative MAC solutions such as CuMACs, Mini-MACs, and ProMACs. These techniques employ state chaining and tag truncation for improved performance and enhanced security levels. These techniques have been relatively unpopular, and these face some security or performance issues to be deployed in real-world scenarios. In this work, we describe how these different schemes have evolved and the limitations of these approaches. Finally, we propose a new MAC approach that reduces communication overhead without compromising security.
@article{MAC,
title={Beyond Traditional Message Authentication Codes: Future Solutions for Efficient Authentication of Message Streams in IoT Networks},
author={Bansal, Gaurang and Sikdar, Biplab},
journal={IEEE Internet of Things Magazine},
publisher={IEEE},
year={Revision},
abstract={
One of the significant challenges of secure communication in resource-constrained environments is the overhead of integrity protection. The tags of traditional Message Authentication Code (MAC) schemes (e.g., HMAC) occupy most of the total payload. This led to the rise of innovative MAC solutions such as CuMACs, Mini-MACs, and ProMACs. These techniques employ state chaining and tag truncation for improved performance and enhanced security levels. These techniques have been relatively unpopular, and these face some security or performance issues to be deployed in real-world scenarios. In this work, we describe how these different schemes have evolved and the limitations of these approaches. Finally, we propose a new MAC approach that reduces communication overhead without compromising security.
}
}
Downloads: 0
{"_id":"95Ki6hjBhSssRAosF","bibbaseid":"bansal-sikdar-beyondtraditionalmessageauthenticationcodesfuturesolutionsforefficientauthenticationofmessagestreamsiniotnetworks-revision","author_short":["Bansal, G.","Sikdar, B."],"bibdata":{"bibtype":"article","type":"article","title":"Beyond Traditional Message Authentication Codes: Future Solutions for Efficient Authentication of Message Streams in IoT Networks","author":[{"propositions":[],"lastnames":["Bansal"],"firstnames":["Gaurang"],"suffixes":[]},{"propositions":[],"lastnames":["Sikdar"],"firstnames":["Biplab"],"suffixes":[]}],"journal":"IEEE Internet of Things Magazine","publisher":"IEEE","year":"Revision","abstract":"One of the significant challenges of secure communication in resource-constrained environments is the overhead of integrity protection. The tags of traditional Message Authentication Code (MAC) schemes (e.g., HMAC) occupy most of the total payload. This led to the rise of innovative MAC solutions such as CuMACs, Mini-MACs, and ProMACs. These techniques employ state chaining and tag truncation for improved performance and enhanced security levels. These techniques have been relatively unpopular, and these face some security or performance issues to be deployed in real-world scenarios. In this work, we describe how these different schemes have evolved and the limitations of these approaches. Finally, we propose a new MAC approach that reduces communication overhead without compromising security. ","bibtex":"@article{MAC,\n title={Beyond Traditional Message Authentication Codes: Future Solutions for Efficient Authentication of Message Streams in IoT Networks},\n author={Bansal, Gaurang and Sikdar, Biplab},\n journal={IEEE Internet of Things Magazine},\n publisher={IEEE},\n year={Revision},\n abstract={\n One of the significant challenges of secure communication in resource-constrained environments is the overhead of integrity protection. The tags of traditional Message Authentication Code (MAC) schemes (e.g., HMAC) occupy most of the total payload. This led to the rise of innovative MAC solutions such as CuMACs, Mini-MACs, and ProMACs. These techniques employ state chaining and tag truncation for improved performance and enhanced security levels. These techniques have been relatively unpopular, and these face some security or performance issues to be deployed in real-world scenarios. In this work, we describe how these different schemes have evolved and the limitations of these approaches. Finally, we propose a new MAC approach that reduces communication overhead without compromising security.\n }\n}\n","author_short":["Bansal, G.","Sikdar, B."],"key":"MAC","id":"MAC","bibbaseid":"bansal-sikdar-beyondtraditionalmessageauthenticationcodesfuturesolutionsforefficientauthenticationofmessagestreamsiniotnetworks-revision","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/HArBZApEudofoZrvQ/papers.bib","dataSources":["yEbGDMwDLfENqgbaq"],"keywords":[],"search_terms":["beyond","traditional","message","authentication","codes","future","solutions","efficient","authentication","message","streams","iot","networks","bansal","sikdar"],"title":"Beyond Traditional Message Authentication Codes: Future Solutions for Efficient Authentication of Message Streams in IoT Networks","year":null}