Lightweight Parabola Chaotic Keyed Hash Using SRAM-PUF for IoT Authentication

被引:0
|
作者
Jiteurtragool, Nattagit [1 ]
Samkunta, Jirayu [2 ]
Ketthong, Patinya [3 ]
机构
[1] King Mongkuts Univ Technol, Informat Sci Fac Appl Sci, Dept Comp, Bangkok, Thailand
[2] Gunma Univ, King Mongkuts Univ Technol, Grad Sch Sci & Technol, Bangkok, Japan
[3] Thai Nichi Inst Technol, Intelligent Elect Syst Lab IES, Bangkok, Thailand
关键词
SRAM PUF; PUF key generation; chaotic keyed hash; device authentication; discrete-time chaotic;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces a lightweight and efficient keyed hash function tailored for resource-constrained Internet of Things (IoT) environments, leveraging the chaotic properties of the Parabola Chaotic Map. By combining the inherent unpredictability of chaotic systems with a streamlined cryptographic design, the proposed hash function ensures robust security and low computational overhead. The function is further strengthened by integrating it with a Physical Unclonable Function (PUF) based on SRAM initial values, which serves as a secure and tamper-resistant source of device-specific keys. Experimental validation on an ESP32 microcontroller demonstrates the function's high sensitivity to input variations, exceptional statistical randomness, and resistance to cryptographic attacks, including collisions and differential analysis. With a mean bit-change probability nearing the ideal 50% and 100% reliability in key generation under varying conditions, the system addresses critical IoT security challenges such as cloning, replay attacks, and tampering. This work contributes a novel solution that combines chaos theory and hardware-based security to advance secure, efficient, and scalable authentication mechanisms for IoT applications.
引用
收藏
页码:724 / 730
页数:7
相关论文
共 50 条
  • [11] Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA
    Huth, Christopher
    Aysu, Aydin
    Guajardo, Jorge
    Duplys, Paul
    Gueneysu, Tim
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 28 - 48
  • [12] LPA: A Lightweight PUF-based Authentication Protocol for IoT System
    Rai, Vikash Kumar
    Tripathy, Somanath
    Mathew, Jimson
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1712 - 1717
  • [13] Device Authentication in IoT using Reconfigurable PUF
    Jain, Ankur
    Joshi, Amit M.
    2019 2ND IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (IEEEMENACOMM'19), 2019, : 216 - 219
  • [14] Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network
    Roy, Sourav
    Das, Dipnarayan
    Sen, Bibhash
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2024, 20 (01)
  • [15] Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
    Gaikwad, Vishesh P.
    Tembhurne, Jitendra, V
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (08): : 8281 - 8304
  • [16] Secured Cloud Communication Using Lightweight Hash Authenticationwith PUF
    Padmavathy, R.
    Rajkumar, M. Newlin
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (01): : 233 - 243
  • [17] Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
    Vishesh P. Gaikwad
    Jitendra V. Tembhurne
    Chandrashekhar Meshram
    Cheng-Chi Lee
    The Journal of Supercomputing, 2021, 77 : 8281 - 8304
  • [18] A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
    Idriss, Tarek A.
    Idriss, Haytham A.
    Bayoumi, Magdy A.
    IEEE ACCESS, 2021, 9 : 80546 - 80558
  • [19] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175
  • [20] SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices
    Farha, Fadi
    Ning, Huansheng
    Ali, Karim
    Chen, Liming
    Nugent, Christopher
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5904 - 5913