The Improvement of PUF-Based Authentication in IoT Systems

被引:0
|
作者
Nurkifli, E. Haodudin [1 ,2 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Univ Singaperbangsa Karawang, Fac Comp Sci, Sukamakmur, West Java, Indonesia
关键词
adversary model; internet of things; authentication protocol; Physical Unclonable Function (PUF); masking method; PHYSICAL UNCLONABLE FUNCTIONS; KEY EXCHANGE; SECURITY; INTERNET;
D O I
10.12720/jait.14.5.918-927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been widely utilized in many fields, including healthcare, manufacturing, and intelligent transportation. IoT has many advantages, including the ease of collecting, accessing, and editing data remotely. Unfortunately, IoT has also given rise to many risks due to its lack of security features. Authentication protocols for IoT environments have been proposed using Physical Unclonable Functions (PUFs) to resolve security problems in IoT environments. However, we have found that these protocols have weaknesses, where the attacker steals the IoT device, obtains data from the communication channel, and has the ability to program for activating PUF, hence the attacker gets the challenge and generates a response. Therefore, we propose a new authentication protocol that resolves the issues with the existing protocol to safeguard against the attack mentioned above with PUF and masking method. We present the results of the Real or Random model (RoR model), which shows that our protocol is secure. The programming model (Scyther tool) also shows that our protocol is safe and can withstand attacks. Finally, our protocol has a low computational time.
引用
收藏
页码:918 / 927
页数:10
相关论文
共 50 条
  • [21] A PUF-Based Paradigm for IoT Security
    Idriss, Tarek
    Idriss, Haytham
    Bayoumi, Magdy
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 700 - 705
  • [22] A PUF-based cryptographic security solution for IoT systems on chip
    Balan, Alexandra
    Balan, Titus
    Cirstea, Marcian
    Sandu, Florin
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [23] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
  • [24] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
  • [25] A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT
    Li, Sensen
    Huang, Yicai
    Yu, Bin
    COMPUTER NETWORKS, 2024, 247
  • [26] Quantum cloning attacks against PUF-based quantum authentication systems
    Yao, Yao
    Gao, Ming
    Li, Mo
    Zhang, Jian
    QUANTUM INFORMATION PROCESSING, 2016, 15 (08) : 3311 - 3325
  • [27] A Double PUF-Based RFID Authentication Protocol
    Li T.
    Liu Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [28] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [29] Quantum cloning attacks against PUF-based quantum authentication systems
    Yao Yao
    Ming Gao
    Mo Li
    Jian Zhang
    Quantum Information Processing, 2016, 15 : 3311 - 3325
  • [30] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)