Many distributed systems assume participants are both performant and secure, characteristics offered by many cloud-based systems. However, scaling distributed techniques down to highly resource- or power-constrained contexts may require alternative approaches. One such context is the deployment of ad hoc distributed systems in insecure or uncontrolled areas, for example during disaster response activities. Providing reliable and secure service is exacerbated by the computational and power constraints imposed on these devices. In this work, we first introduce the concept of on-demand topic-channels. Then, we describe three message authentication protocols which provide secure, authenticated communication between participants and a coordinator, while also providing resilience from adversarial or accidental disruption. We leverage homomorphic hashing primitives to trade message secrecy against communication and computational costs. Finally, we assess these protocols, and show that our hash-based protocols provide significant efficiency improvements over traditional encryption-based approaches.

Original languageEnglish (US)
Title of host publicationHPDC 2018 - Proceedings of The 27th International Symposium on High-Performance Parallel and Distributed Computing Posters/Doctoral Consortium
PublisherAssociation for Computing Machinery, Inc
Number of pages2
ISBN (Electronic)9781450358996
StatePublished - Jun 11 2018
Event27th ACM International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2018 - Tempe, United States
Duration: Jun 11 2018 → …


Other27th ACM International Symposium on High-Performance Parallel and Distributed Computing, HPDC 2018
CountryUnited States
Period6/11/18 → …


  • Distributed systems
  • Homomorphic hashing
  • Messaging protocols

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Computational Theory and Mathematics

Fingerprint Dive into the research topics of 'Lightweight authentication for fault-tolerant topic-channels in ad hoc distributed systems'. Together they form a unique fingerprint.

Cite this