PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks

被引:2
|
作者
Xie, Qi [1 ]
Yao, Ye [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 13期
基金
中国国家自然科学基金;
关键词
underwater acoustic networks; authentication; protocol; chaotic maps; PUF; MUTUAL AUTHENTICATION; SCHEME; SECURITY;
D O I
10.3390/app14135400
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A secure and effective authentication and communication scheme between users and underwater sensors plays an important role in improving the detection and utilization of marine resources in underwater acoustic networks (UANs). However, due to the energy limitations and susceptibility to capture of underwater sensors and gateways, it is necessary to design a lightweight authentication protocol that can resist capture of sensors and gateways during attacks. In this paper, a lightweight authentication protocol for UANs based on the Physical Unclonable Function (PUF) and chaotic map is proposed. We used the advantages of PUF to resist sensors and gateways being captured in attacks and the chaotic map to achieve lightweight authentication because the computational cost of the chaotic map is almost one-third that of Elliptic Curve Cryptography (ECC). Additionally, we used the formal security proof in the random oracle model to prove the security of the proposed scheme. Our scheme was more secure and efficient compared with some other related schemes in terms of security and performance requirements, and the proposed scheme is suitable for UANs.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Xinhong Hao
    Jiantao Wang
    Qinghai Yang
    Xiaopeng Yan
    Ping Li
    Journal of Medical Systems, 2013, 37
  • [22] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    Wireless Personal Communications, 2018, 98 : 1135 - 1154
  • [23] Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments
    Pang, Fengling
    Hsu, Chingfang
    Au, Man Ho
    Harn, Lein
    Zhang, Ze
    Long, Li
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 849 - 856
  • [24] A Lightweight Authentication Scheme for Power IoT Based on PUF and Chebyshev Chaotic Map
    Jin, Xianji
    Lin, Na
    Li, Zhongwei
    Jiang, Wenqi
    Jia, Yuge
    Li, Qingyang
    IEEE ACCESS, 2024, 12 : 83692 - 83706
  • [25] P-MAP: PUF-based Mutual Authentication Protocol
    Mona, Alkanhal
    Younis, Mohamed
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3424 - 3429
  • [26] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [27] PUF Based Authentication Protocol for IoT
    Braeken, An
    SYMMETRY-BASEL, 2018, 10 (08):
  • [28] A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0
    Altameem, Ayman
    Prabu, P.
    Senthilnathan, T.
    Poonia, Ramesh Chandra
    Saudagar, Abdul Khader Jilani
    SYSTEMS, 2023, 11 (01):
  • [29] A secure chaotic map-based remote authentication scheme for telecare medicine information systems
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Xu, Lili
    Shen, Jian
    Jo, Minho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 149 - 159
  • [30] CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
    Tanveer, Muhammad
    Badshah, Akhtar
    Khan, Abd Ullah
    Alasmary, Hisham
    Chaudhry, Shehzad Ashraf
    INTERNET OF THINGS, 2023, 23