LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems
Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5936 https://ink.library.smu.edu.sg/context/sis_research/article/6939/viewcontent/3320269.3372195.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-6939 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-69392021-05-14T04:54:34Z LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems YANG, Zheng JIN, Chenglu TIAN, Yangguang LAI, Junyu ZHOU, Jianying Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control decisions according to the received sensor data. Due to the existence of spoofing attacks (more specifically to CPS, false data injection attacks), one has to protect the authenticity and integrity of the transmitted data. For example, a digital signature can be used to solve this issue. However, the resource-constrained field devices like sensors cannot afford conventional signature computation. Thus, we have to seek for an efficient signature mechanism that can support the fast and continuous message authentication in CPS, while being easy to compute on the devices. To this end, we introduce two Lightweight Signature schemes (LiS), which are suitable for continuous message authentication commonly seen in cyber-physical systems. In our constructions, we exploit the efficient hash collision generation property of a chameleon hash function to transform a chameleon hash function into signature schemes. In our schemes, the signature of a message m is the randomness r associated with m in a chameleon hash function, such that they can lead to a hash collision with a given message randomness pair $(m', r')$. Thus, the task of a signer is to generate the collision using the private key of the underlying chameleon hash function, and a verifier can verify the signature by checking the hash collision with a known message and randomness pair. We also specifically instantiate the chameleon hash function in such a way that it leads to a fast signing procedure and an optimal storage requirement on the signer side. The optimized signing algorithms are very efficient. Namely, our first scheme requires only three additions and two multiplications, and only one additional hash is needed in the second scheme to resist adaptive chosen message attacks. In addition, the size of the signing key in our schemes is a small constant-sized bit string, which well fits CPS applications. 2020-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/5936 info:doi/10.1145/3320269.3372195 https://ink.library.smu.edu.sg/context/sis_research/article/6939/viewcontent/3320269.3372195.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Digital signature bloom filter chameleon hash continuous message authentication Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Digital signature bloom filter chameleon hash continuous message authentication Information Security |
spellingShingle |
Digital signature bloom filter chameleon hash continuous message authentication Information Security YANG, Zheng JIN, Chenglu TIAN, Yangguang LAI, Junyu ZHOU, Jianying LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems |
description |
Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form the basis of emerging and future smart services and improve our quality of life in many areas. In such CPS, sensor data is transmitted over the network to the controller, which will make real-time control decisions according to the received sensor data. Due to the existence of spoofing attacks (more specifically to CPS, false data injection attacks), one has to protect the authenticity and integrity of the transmitted data. For example, a digital signature can be used to solve this issue. However, the resource-constrained field devices like sensors cannot afford conventional signature computation. Thus, we have to seek for an efficient signature mechanism that can support the fast and continuous message authentication in CPS, while being easy to compute on the devices. To this end, we introduce two Lightweight Signature schemes (LiS), which are suitable for continuous message authentication commonly seen in cyber-physical systems. In our constructions, we exploit the efficient hash collision generation property of a chameleon hash function to transform a chameleon hash function into signature schemes. In our schemes, the signature of a message m is the randomness r associated with m in a chameleon hash function, such that they can lead to a hash collision with a given message randomness pair $(m', r')$. Thus, the task of a signer is to generate the collision using the private key of the underlying chameleon hash function, and a verifier can verify the signature by checking the hash collision with a known message and randomness pair. We also specifically instantiate the chameleon hash function in such a way that it leads to a fast signing procedure and an optimal storage requirement on the signer side. The optimized signing algorithms are very efficient. Namely, our first scheme requires only three additions and two multiplications, and only one additional hash is needed in the second scheme to resist adaptive chosen message attacks. In addition, the size of the signing key in our schemes is a small constant-sized bit string, which well fits CPS applications. |
format |
text |
author |
YANG, Zheng JIN, Chenglu TIAN, Yangguang LAI, Junyu ZHOU, Jianying |
author_facet |
YANG, Zheng JIN, Chenglu TIAN, Yangguang LAI, Junyu ZHOU, Jianying |
author_sort |
YANG, Zheng |
title |
LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems |
title_short |
LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems |
title_full |
LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems |
title_fullStr |
LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems |
title_full_unstemmed |
LiS: Lightweight Signature Schemes for continuous message authentication in cyber-physical systems |
title_sort |
lis: lightweight signature schemes for continuous message authentication in cyber-physical systems |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/5936 https://ink.library.smu.edu.sg/context/sis_research/article/6939/viewcontent/3320269.3372195.pdf |
_version_ |
1770575697263198208 |