The Improvement of PUF-Based Authentication in IoT Systems

被引:0
|
作者
Nurkifli, E. Haodudin [1 ,2 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Univ Singaperbangsa Karawang, Fac Comp Sci, Sukamakmur, West Java, Indonesia
关键词
adversary model; internet of things; authentication protocol; Physical Unclonable Function (PUF); masking method; PHYSICAL UNCLONABLE FUNCTIONS; KEY EXCHANGE; SECURITY; INTERNET;
D O I
10.12720/jait.14.5.918-927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been widely utilized in many fields, including healthcare, manufacturing, and intelligent transportation. IoT has many advantages, including the ease of collecting, accessing, and editing data remotely. Unfortunately, IoT has also given rise to many risks due to its lack of security features. Authentication protocols for IoT environments have been proposed using Physical Unclonable Functions (PUFs) to resolve security problems in IoT environments. However, we have found that these protocols have weaknesses, where the attacker steals the IoT device, obtains data from the communication channel, and has the ability to program for activating PUF, hence the attacker gets the challenge and generates a response. Therefore, we propose a new authentication protocol that resolves the issues with the existing protocol to safeguard against the attack mentioned above with PUF and masking method. We present the results of the Real or Random model (RoR model), which shows that our protocol is secure. The programming model (Scyther tool) also shows that our protocol is safe and can withstand attacks. Finally, our protocol has a low computational time.
引用
收藏
页码:918 / 927
页数:10
相关论文
共 50 条
  • [41] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    ChinaCommunications, 2023, 20 (05) : 198 - 216
  • [42] PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
    Zheng, Yue
    Liu, Wenye
    Gu, Chongyan
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3299 - 3316
  • [43] PUF-based Lightweight Authentication for Binarized Neural Networks
    Rajendran, Gokulnath
    Deb, Suman
    Chattopadhyay, Anupam
    2024 IEEE THE 20TH ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS 2024, 2024, : 447 - 451
  • [44] Integrating an optimised PUF-based authentication scheme in OSCORE
    Diaz, Jaime Perez
    Almenares, Florina
    AD HOC NETWORKS, 2023, 140
  • [45] PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
    Lee, JoonYoung
    Oh, JiHyeon
    Kwon, DeokKyu
    Kim, MyeongHyun
    Yu, SungJin
    Jho, Nam-Su
    Park, Youngho
    SENSORS, 2022, 22 (18)
  • [46] A PUF-based Lightweight and Secure Mutual Authentication Mechanism for Remote Keyless Entry Systems
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1776 - 1781
  • [47] PUF Based Authentication Protocol for IoT
    Braeken, An
    SYMMETRY-BASEL, 2018, 10 (08):
  • [48] Verification of PUF-based IoT Protocols with AVISPA and Scyther
    Rabas, Tomas
    Lorencz, Robert
    Bucek, Jiri
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 627 - 635
  • [49] Designing secure PUF-based authentication protocols for constrained environments
    Lee, Sang-Woong
    Safkhani, Masoumeh
    Quynh Le
    Ahmed, Omed Hassan
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Bagheri, Nasour
    SCIENTIFIC REPORTS, 2023, 13 (01):
  • [50] A New Secure Scan Design with PUF-based Key for Authentication
    Wang, Qidong
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,