A Defensive Strategy for Integrity Detection in Cyber-Physical Systems Subject to Deception Attacks
A new structure of the hash-based message authentication code (HMAC) algorithm is designed in this paper to withstand the common deception attacks in cyber-physical systems. By changing the number of times that the hash function is called at each time, a lightweight recursive hash algorithm is appli...
Saved in:
Published in | International Conference on Information Science and Technology pp. 241 - 246 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.09.2020
|
Subjects | |
Online Access | Get full text |
ISSN | 2573-3311 |
DOI | 10.1109/ICIST49303.2020.9202239 |
Cover
Summary: | A new structure of the hash-based message authentication code (HMAC) algorithm is designed in this paper to withstand the common deception attacks in cyber-physical systems. By changing the number of times that the hash function is called at each time, a lightweight recursive hash algorithm is applied to calculate the stochastic sequence in order to resist the recent attacks on HMAC that include the long message attacks with function graph and the short message attacks with multi-collisions. Feasibility of the scheme is discussed in detail, and the simulation results show the randomness of the message authentication codes obtained in this paper. |
---|---|
ISSN: | 2573-3311 |
DOI: | 10.1109/ICIST49303.2020.9202239 |