LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems

Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Zheng, JIN, Chenglu, TIAN, Yangguang, LAI, Junyu, ZHOU, Jianying
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5936
https://ink.library.smu.edu.sg/context/sis_research/article/6939/viewcontent/3320269.3372195.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-6939
record_format dspace
spelling sg-smu-ink.sis_research-69392021-05-14T04:54:34Z LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems YANG, Zheng JIN, Chenglu TIAN, Yangguang LAI, Junyu ZHOU, Jianying Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control decisions according to the received sensor data. Due to the existence of spoofing attacks (more specifically to CPS, false data injection attacks), one has to protect the authenticity and integrity of the transmitted data. For example, a digital signature can be used to solve this issue. However, the resource-constrained field devices like sensors cannot afford conventional signature computation. Thus, we have to seek for an efficient signature mechanism that can support the fast and continuous message authentication in CPS, while being easy to compute on the devices. To this end, we introduce two Lightweight Signature schemes (LiS), which are suitable for continuous message authentication commonly seen in cyber-physical systems. In our constructions, we exploit the efficient hash collision generation property of a chameleon hash function to transform a chameleon hash function into signature schemes. In our schemes, the signature of a message m is the randomness r associated with m in a chameleon hash function, such that they can lead to a hash collision with a given message randomness pair $(m', r')$. Thus, the task of a signer is to generate the collision using the private key of the underlying chameleon hash function, and a verifier can verify the signature by checking the hash collision with a known message and randomness pair. We also specifically instantiate the chameleon hash function in such a way that it leads to a fast signing procedure and an optimal storage requirement on the signer side. The optimized signing algorithms are very efficient. Namely, our first scheme requires only three additions and two multiplications, and only one additional hash is needed in the second scheme to resist adaptive chosen message attacks. In addition, the size of the signing key in our schemes is a small constant-sized bit string, which well fits CPS applications. 2020-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5936 info:doi/10.1145/3320269.3372195 https://ink.library.smu.edu.sg/context/sis_research/article/6939/viewcontent/3320269.3372195.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Digital signature bloom filter chameleon hash continuous message authentication Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Digital signature bloom filter
chameleon hash
continuous message authentication
Information Security
spellingShingle Digital signature bloom filter
chameleon hash
continuous message authentication
Information Security
YANG, Zheng
JIN, Chenglu
TIAN, Yangguang
LAI, Junyu
ZHOU, Jianying
LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
description Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control decisions according to the received sensor data. Due to the existence of spoofing attacks (more specifically to CPS, false data injection attacks), one has to protect the authenticity and integrity of the transmitted data. For example, a digital signature can be used to solve this issue. However, the resource-constrained field devices like sensors cannot afford conventional signature computation. Thus, we have to seek for an efficient signature mechanism that can support the fast and continuous message authentication in CPS, while being easy to compute on the devices. To this end, we introduce two Lightweight Signature schemes (LiS), which are suitable for continuous message authentication commonly seen in cyber-physical systems. In our constructions, we exploit the efficient hash collision generation property of a chameleon hash function to transform a chameleon hash function into signature schemes. In our schemes, the signature of a message m is the randomness r associated with m in a chameleon hash function, such that they can lead to a hash collision with a given message randomness pair $(m', r')$. Thus, the task of a signer is to generate the collision using the private key of the underlying chameleon hash function, and a verifier can verify the signature by checking the hash collision with a known message and randomness pair. We also specifically instantiate the chameleon hash function in such a way that it leads to a fast signing procedure and an optimal storage requirement on the signer side. The optimized signing algorithms are very efficient. Namely, our first scheme requires only three additions and two multiplications, and only one additional hash is needed in the second scheme to resist adaptive chosen message attacks. In addition, the size of the signing key in our schemes is a small constant-sized bit string, which well fits CPS applications.
format text
author YANG, Zheng
JIN, Chenglu
TIAN, Yangguang
LAI, Junyu
ZHOU, Jianying
author_facet YANG, Zheng
JIN, Chenglu
TIAN, Yangguang
LAI, Junyu
ZHOU, Jianying
author_sort YANG, Zheng
title LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
title_short LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
title_full LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
title_fullStr LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
title_full_unstemmed LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
title_sort lis: lightweight signature schemes for continuous message authentication in cyber-physical systems
publisher Institutional Knowledge at Singapore Management University
publishDate 2020
url https://ink.library.smu.edu.sg/sis_research/5936
https://ink.library.smu.edu.sg/context/sis_research/article/6939/viewcontent/3320269.3372195.pdf
_version_ 1770575697263198208