Next Article in Journal
Multilayered Artificial Dura-Mater Models for a Minimally Invasive Brain Surgery Simulator
Next Article in Special Issue
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
Previous Article in Journal
Defining SMEs’ 4.0 Readiness Indicators
Previous Article in Special Issue
Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees
Article

A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard

1
Department of Computer Science, Kyonggi University, Suwon-si, Gyeonggi-do 16227, Korea
2
Agency for Defense Development (ADD), Seoul 05661, Korea
3
Department of Information Security, Seoul Women’s University, Seoul 01797, Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(24), 8999; https://doi.org/10.3390/app10248999
Received: 23 November 2020 / Revised: 10 December 2020 / Accepted: 14 December 2020 / Published: 16 December 2020
(This article belongs to the Special Issue Cyber Security of Critical Infrastructures)
Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) and multi-TDL networks (MTN). This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. The application of such authentication algorithms to TDL and MTN in a rapidly changing battlefield environment without reinforcement measures will lead to functional weaknesses and vulnerabilities when high-level digital-covert activities and deception tactics are implemented. Consequently, the existing VMF authentication scheme must be improved to secure transmission integrity, lower network transaction, and receive authentication tactical information in VMF-based combat network radio (CNR) networks. Therefore, in this study, a tactical wireless ad hoc network topology, similar to that of the existing CNRs, is considered, and a lightweight multi-factor hash chain-based authentication scheme that includes a time-based one-time password (T-OTP) for network overhead reduction and terminal authentication is proposed, coupled with exception handling. The proposed method enhances the confidentiality of tactical message exchanges and reduces unnecessary network transactions and transmission bits for authentication flows between real-time military terminals owned by squads, while ensuring robustness in limited battlefields. Based on these approaches, in the future, we intend to increase the authentication reliability between wireless terminals in the Korean variable message format (KVMF)-based CNR networks based on the Korean Army Corps network scenarios. View Full-Text
Keywords: military; VMF; hash chain; T-OTP; lightweight secure hash (LSH); CNR military; VMF; hash chain; T-OTP; lightweight secure hash (LSH); CNR
Show Figures

Figure 1

MDPI and ACS Style

Kim, D.; Seo, S.; Kim, H.; Lim, W.G.; Lee, Y.K. A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard. Appl. Sci. 2020, 10, 8999. https://doi.org/10.3390/app10248999

AMA Style

Kim D, Seo S, Kim H, Lim WG, Lee YK. A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard. Applied Sciences. 2020; 10(24):8999. https://doi.org/10.3390/app10248999

Chicago/Turabian Style

Kim, Dohoon, Sang Seo, Heesang Kim, Won G. Lim, and Youn K. Lee 2020. "A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard" Applied Sciences 10, no. 24: 8999. https://doi.org/10.3390/app10248999

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop