REPRESENTATION OF MULTIPLE MESSAGE AUTHENTICATION CODES USING BLOOM FILTERS

Multiple Message Authentication Codes can be represented by one of theShort MAC, Bloom Filter or Compressed Bloom Filter to reduce communication overheads. However, this will inevitably increasefalse positive rate (fpr) which is a false authentication probability of adversarial messages in trade-off of communication efficiency. While the simple short MAC scheme has the lowest fpr, one cannot choose arbitrary authenticator size. Bloom filter, randomized data structure often used for membership queries, can represent multiple MACs more flexibly with slightly higher fpr. Furthermore, compressed Bloom filter has the same fpr with the short MAC while maintaining its flexibility. Through our detailed analysis, we show that pros and cons of the three schemes are scenario specific. Therefore one can choose appropriate scheme under given parameters to achieve both communication efficiency and security based on our results.

[1]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.

[2]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[3]  Poj Tangamchit,et al.  A Comparison Study of Static and Dynamic Walking Model of A Biped Robot , 2006 .

[4]  Haiyun Luo,et al.  Authenticated flooding in large-scale sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[5]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[6]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[7]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[8]  Kanda Runapongsa,et al.  XBrevity: XML Data Compression using Brevity Encoding , 2006 .

[9]  Ian H. Witten,et al.  Arithmetic coding revisited , 1998, TOIS.