TY - GEN
T1 - Path Authentication Protocol
T2 - 1st Silicon Valley Cybersecurity Conference, SVCC 2020
AU - Taketa, Yuki
AU - Kodera, Yuta
AU - Kusaka, Takuya
AU - Nogami, Yasuyuki
N1 - Funding Information:
Acknowledgment. This work was partially supported by the JSPS KAKENHI Grant-in-Aid for Challenging Research (Pioneering) JP20K20484 and Grant-in-Aid for Research Activity Start-up JP20K23327.
Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - In this research, the authors propose a functionality based on message authentication code (MAC) to ensure the correctness of its path from a source to a destination. It aims to use a controller area network (CAN) over driving system. In the construction, MAC and a pseudorandom number generator having an intentional group structure are employed so that the correct user can authenticate a message and its path. The proposed method is experimentally evaluated by observing the computational time over IoT devices. As a result, it is found that the results show that it is possible to implement as an additional function that gives path authentication with additional time at most 3 times for the corresponding computation.
AB - In this research, the authors propose a functionality based on message authentication code (MAC) to ensure the correctness of its path from a source to a destination. It aims to use a controller area network (CAN) over driving system. In the construction, MAC and a pseudorandom number generator having an intentional group structure are employed so that the correct user can authenticate a message and its path. The proposed method is experimentally evaluated by observing the computational time over IoT devices. As a result, it is found that the results show that it is possible to implement as an additional function that gives path authentication with additional time at most 3 times for the corresponding computation.
KW - Chaskey
KW - Controller area network
KW - Message authentication code (MAC)
KW - Non-linear filter generator
KW - Path authentication
UR - http://www.scopus.com/inward/record.url?scp=85107411440&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85107411440&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-72725-3_3
DO - 10.1007/978-3-030-72725-3_3
M3 - Conference contribution
AN - SCOPUS:85107411440
SN - 9783030727246
T3 - Communications in Computer and Information Science
SP - 38
EP - 48
BT - Silicon Valley Cybersecurity Conference - First Conference, SVCC 2020, Revised Selected Papers
A2 - Park, Younghee
A2 - Jadav, Divyesh
A2 - Austin, Thomas
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 17 December 2020 through 19 December 2020
ER -