Skip to main content

Improvement of Lightweight Integrity Verification Algorithm Using TDHA

  • Conference paper
  • First Online:
Advanced Computing Technologies and Applications

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 930 Accesses

Abstract

Data integrity is the assurance that the data sent will remain unaltered when it reaches the receiver. It aims to prevent unintentional and unauthorized changes to sensitive and confidential data. In this paper, we present a research on the various lightweight data integrity algorithms such as lightweight integrity verification (LIVE), the Secure Hash Algorithms (SHA1, SHA2, SHA3), lightweight one-way cryptographic hash algorithm (LOCHA), timestamp defined hash algorithm (TDHA), the one-time signature algorithm and the leapfrog technique. The motive behind this research is, first, to provide an overview of these algorithms and second, to suggest changes that will further improve the performance of one of these lightweight algorithms, namely LIVE. We suggest an improvement to traditional token generation in LIVE using TDHA instead of SHA-1. A refinement of content signing and verification using the leapfrog technique is also proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li Q, Zhang X, Zheng Q, Sandhu R, Fu X (2015) LIVE: lightweight integrity verification and content access control for named data networking. In: IEEE transactions on information forensics and security. IEEE, pp 308–320

    Google Scholar 

  2. Merkle R (1987) A digital signature based on a conventional encryption function. In: Advances in cryptology—CRYPTO. Springer, pp 369–378

    Google Scholar 

  3. Zhang K (1998) Efficient protocols for signing routing messages. In: Proceedings of the network and distributed system security symposium—NDSS. The Internet Society, pp 1–7

    Google Scholar 

  4. Rivest R (1992) The MD5 message-digest algorithm. In: Internet RFC 1321. RFC Editor

    Google Scholar 

  5. National Institute of Standards and Technology (1993) FIPS 180-1 Secure Hash Standard (SHS). FIPS-PUBS

    Google Scholar 

  6. Stevens M (2012) Cryptanalysis of MD5 & SHA-1. In: 80th anniversary of breaking the enigma code—return to the roots. Military University of Technology, Warsaw

    Google Scholar 

  7. National Institute of Standards and Technology (2001) FIPS 180-2 Secure Hash Standard (SHS). FIPS-PUBS

    Google Scholar 

  8. Dworkin M (2015) SHA-3 Standard: permutation-based hash and extendable-output functions. Federal Information Process Standards. NIST FIPS

    Google Scholar 

  9. Bertoni G, Daemen J, Peeters M, Van Assche G (2007) Sponge functions. In: Ecrypt workshop on cryptographic hash functions. Barcelona

    Google Scholar 

  10. Chowdhury A, Chatterjee T, DasBit S (2014) LOCHA: a lightweight one-way cryptographic hash algorithm for wireless sensor network. In: Elsevier science procedia computer science. ScienceDirect, pp 497–504

    Google Scholar 

  11. Mondal A, Mitra S (2016) TDHA: timestamp defined hash algorithm for secure data dissemination in VANET. In: International conference on computational modeling and security. ScienceDirect, Bangalore, pp 190–197

    Google Scholar 

  12. Durresi A, Paruchuri V, Kannan R, Iyengar S (2005) A lightweight protocol for data integrity in sensor networks. Int J Distrib Sens Netw 1(2):205–214

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soham Khedekar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gangwal, A., Mehta, D., Khedekar, S., Gawde, A. (2020). Improvement of Lightweight Integrity Verification Algorithm Using TDHA. In: Vasudevan, H., Michalas, A., Shekokar, N., Narvekar, M. (eds) Advanced Computing Technologies and Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-3242-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3242-9_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3241-2

  • Online ISBN: 978-981-15-3242-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics