Abstract
Data integrity is the assurance that the data sent will remain unaltered when it reaches the receiver. It aims to prevent unintentional and unauthorized changes to sensitive and confidential data. In this paper, we present a research on the various lightweight data integrity algorithms such as lightweight integrity verification (LIVE), the Secure Hash Algorithms (SHA1, SHA2, SHA3), lightweight one-way cryptographic hash algorithm (LOCHA), timestamp defined hash algorithm (TDHA), the one-time signature algorithm and the leapfrog technique. The motive behind this research is, first, to provide an overview of these algorithms and second, to suggest changes that will further improve the performance of one of these lightweight algorithms, namely LIVE. We suggest an improvement to traditional token generation in LIVE using TDHA instead of SHA-1. A refinement of content signing and verification using the leapfrog technique is also proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li Q, Zhang X, Zheng Q, Sandhu R, Fu X (2015) LIVE: lightweight integrity verification and content access control for named data networking. In: IEEE transactions on information forensics and security. IEEE, pp 308–320
Merkle R (1987) A digital signature based on a conventional encryption function. In: Advances in cryptology—CRYPTO. Springer, pp 369–378
Zhang K (1998) Efficient protocols for signing routing messages. In: Proceedings of the network and distributed system security symposium—NDSS. The Internet Society, pp 1–7
Rivest R (1992) The MD5 message-digest algorithm. In: Internet RFC 1321. RFC Editor
National Institute of Standards and Technology (1993) FIPS 180-1 Secure Hash Standard (SHS). FIPS-PUBS
Stevens M (2012) Cryptanalysis of MD5 & SHA-1. In: 80th anniversary of breaking the enigma code—return to the roots. Military University of Technology, Warsaw
National Institute of Standards and Technology (2001) FIPS 180-2 Secure Hash Standard (SHS). FIPS-PUBS
Dworkin M (2015) SHA-3 Standard: permutation-based hash and extendable-output functions. Federal Information Process Standards. NIST FIPS
Bertoni G, Daemen J, Peeters M, Van Assche G (2007) Sponge functions. In: Ecrypt workshop on cryptographic hash functions. Barcelona
Chowdhury A, Chatterjee T, DasBit S (2014) LOCHA: a lightweight one-way cryptographic hash algorithm for wireless sensor network. In: Elsevier science procedia computer science. ScienceDirect, pp 497–504
Mondal A, Mitra S (2016) TDHA: timestamp defined hash algorithm for secure data dissemination in VANET. In: International conference on computational modeling and security. ScienceDirect, Bangalore, pp 190–197
Durresi A, Paruchuri V, Kannan R, Iyengar S (2005) A lightweight protocol for data integrity in sensor networks. Int J Distrib Sens Netw 1(2):205–214
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gangwal, A., Mehta, D., Khedekar, S., Gawde, A. (2020). Improvement of Lightweight Integrity Verification Algorithm Using TDHA. In: Vasudevan, H., Michalas, A., Shekokar, N., Narvekar, M. (eds) Advanced Computing Technologies and Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-3242-9_8
Download citation
DOI: https://doi.org/10.1007/978-981-15-3242-9_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3241-2
Online ISBN: 978-981-15-3242-9
eBook Packages: EngineeringEngineering (R0)