RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices
RMAC - A Lightweight Authentication Protocol for Highly Constrained IoT Devices is a scholarly work, published in 2018 in ''International Journal on Cryptography and Information Security''. The main subjects of the publication include cryptographic protocol, authentication, radio-frequency identification, authentication protocol, protocol, computer security, computer network, Internet of things, authentication, embedded system, cryptanalysis, and computer science. Nowadays, highly constrained IoT devices have earned an important place in the authors' everyday lives.These devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components.Their adoption is growing in areas where data security or privacy or both must be guaranteed.Therefore, it is necessary to develop appropriate security solutions for these systems.Many papers have proposed solutions for encryption or authentication.But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, authors introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et al.the authors' proposal named RMAC is well suited for highly constrained IoT devices since its implementation uses simple and lightweight algorithms.We also prove that RMAC is at least as secure as the MM protocol and thus secure against man-in-the-middle attacks.