Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP

Implementing cryptography on devices with low computational power is a necessity as they became involved in communications over public networks. Even more, these devices became ubiquitous and are used in a large area of applications, from home-office systems to industrial control systems. We deal with the design and implementation of a cryptographic protocol that can be used to assure the authenticity of the information broadcasted over UDP from an 8051 based system-on-a-chip to a large number of receivers. The protocol that we use is similar to the well known TESLA protocol that was used in sensor networks, and by using such a protocol information can be broadcasted to a large number of receivers without requiring secret shared keys or expensive public key operations. Some implementation details and experimental results are presented as well, and they show that implementing a cryptographic authentication protocol is feasible even in a constrained environment as offered by the 8051 microcontroller.

[1]  Bogdan Groza,et al.  Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[2]  Marc Fischlin Fast Verification of Hash Chains , 2004, CT-RSA.

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  James D. Gilsinn,et al.  IT Security for Industrial Control Systems: Requirements Specification and Performance Testing Presented at the 2004 NDIA Homeland Security Symposium & Exhibition Hyatt Regency, Crystal City, Virginia, May 25-27, 2004 , 2004 .

[5]  Toma-Leonida Dragomir,et al.  On the use of one-way chain based authentication protocols in secure control systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[6]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[7]  Bruno Crispo,et al.  Individual Authentication in Multiparty Communications , 2002, Comput. Secur..

[8]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[9]  Markus Jakobsson,et al.  Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.

[10]  Bogdan Groza,et al.  Using One-Way Chains to Provide Message Authentication without Shared Secrets , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[11]  Yaron Sella On The Computation-Storage Trade-Offs of Hash Chain Traversal , 2003, Financial Cryptography.

[12]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[13]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[14]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .