A Defensive Strategy for Integrity Detection in Cyber-Physical Systems Subject to Deception Attacks

A new structure of the hash-based message authentication code (HMAC) algorithm is designed in this paper to withstand the common deception attacks in cyber-physical systems. By changing the number of times that the hash function is called at each time, a lightweight recursive hash algorithm is appli...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Information Science and Technology pp. 241 - 246
Main Authors Ren, Xinwei, Liang, Jinling, Liu, Qingshan
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.09.2020
Subjects
Online AccessGet full text
ISSN2573-3311
DOI10.1109/ICIST49303.2020.9202239

Cover

More Information
Summary:A new structure of the hash-based message authentication code (HMAC) algorithm is designed in this paper to withstand the common deception attacks in cyber-physical systems. By changing the number of times that the hash function is called at each time, a lightweight recursive hash algorithm is applied to calculate the stochastic sequence in order to resist the recent attacks on HMAC that include the long message attacks with function graph and the short message attacks with multi-collisions. Feasibility of the scheme is discussed in detail, and the simulation results show the randomness of the message authentication codes obtained in this paper.
ISSN:2573-3311
DOI:10.1109/ICIST49303.2020.9202239