Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings

被引:2
|
作者
Tian, Chuang [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
Li, Teng [1 ,2 ]
Zhang, Junwei [1 ,2 ]
Ma, Chengyan [1 ,2 ]
Xi, Ning [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicles; physical unclonable function; unattended IoT devices; authentication and key agreement; security protocol; UNCLONABLE FUNCTION; LAYER AUTHENTICATION; LIGHTWEIGHT; DESIGN; NOISE; INTERNET;
D O I
10.1109/TIFS.2024.3379861
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core subject of IoT applications, IoT devices have faced numerous security challenges. Especially for IoT devices deployed in remote or harsh environments, they are often unattended for long periods, making it difficult to share the sensing data and susceptible to potential physical attacks. While aerial assistance methods represented by unmanned aerial vehicles (UAVs) can solve the problem of data sharing at a low cost, it is necessary to establish a secure channel between ground control stations, UAVs, and IoT devices due to the sensitivity of the sensing data. Recently, Physical Unclonable Function (PUF) has been proven to provide unique identity identification for devices using its tamper-proof feature. In this paper, we propose a lightweight UAV-assisted authentication and key agreement protocol for unattended IoT devices, ensuring secure communication and physical tamper-proof requirements. However, our work does not stop there. We noticed that some existing PUF-based authentication schemes misunderstand the ability of PUF, which leads to these schemes cannot actually provide physical protection. We analyzed the security vulnerabilities of these schemes and proposed rules that should be followed when designing authentication protocols using PUF. In addition, for the first time, we put forward the formal definitions and proof methods for PUF in the formal proof of the security protocol, which avoided the unreasonable initial assumptions adopted in the proof of the existing schemes. We extended Mao-Boyd (MB) logic and comprehensively analyzed the proposed protocol. We also evaluate the performance of the proposed scheme, and the results show that the proposed scheme has certain advantages in communication and computation overhead compared with existing schemes.
引用
收藏
页码:4448 / 4463
页数:16
相关论文
共 50 条
  • [41] A secure mutual authentication protocol for IoT environment
    Panda P.K.
    Chattopadhyay S.
    Journal of Reliable Intelligent Environments, 2020, 6 (2) : 79 - 94
  • [42] Provably Secure Asymmetric PAKE Protocol for Protecting IoT Access
    Qi, Mingping
    Hu, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7071 - 7078
  • [43] UAV-Assisted Wireless Charging for Energy-Constrained IoT Devices Using Dynamic Matching
    Su, Chunxia
    Ye, Fang
    Wang, Li-Chun
    Wang, Li
    Tian, Yuan
    Han, Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06): : 4789 - 4800
  • [44] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    K. Selvi
    K. Muthumanickam
    P. Vijayalakshmi
    P. C. Senthil Mahesh
    The Journal of Supercomputing, 2023, 79 : 12191 - 12218
  • [45] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    Selvi, K.
    Muthumanickam, K.
    Vijayalakshmi, P.
    Mahesh, P. C. Senthil
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11): : 12191 - 12218
  • [46] Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
    Theera-Umpon, Nipon
    Han, Kun-Hee
    Bae, Woo-Sik
    Lee, Sanghyuk
    Van Huy Pham
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 24 (09) : 1258 - 1270
  • [47] Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing
    Alhassan, Maryam
    Khan, Abdul Raouf
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2727 - 2740
  • [48] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Vinod Mahor
    R. Padmavathy
    Santanu Chatterjee
    Peer-to-Peer Networking and Applications, 2024, 17 : 321 - 336
  • [49] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Mahor, Vinod
    Padmavathy, R.
    Chatterjee, Santanu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 321 - 336
  • [50] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):