Lightweight Authentication Protocol Based on Physical Unclonable Function

被引:1
|
作者
Luo, Hanguang [1 ]
Zou, Tao [1 ]
Wu, Chunming [2 ]
Li, Dan [3 ]
Li, Shunbin [1 ]
Chu, Chu [4 ]
机构
[1] Zhejiang Lab, Hangzhou 311121, Peoples R China
[2] Zhejiang Univ, Hangzhou 310058, Peoples R China
[3] Tsinghua Univ, Beijing 100084, Peoples R China
[4] Univ British Columbia, Vancouver, BC V1V1V7, Canada
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 03期
基金
中国博士后科学基金;
关键词
Lightweight; authentication; physically unclonable functions; SECURITY;
D O I
10.32604/cmc.2022.027118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy, storage, and processing. Although recently many lightweight schemes have been proposed, to the best of our knowledge, they are unable to address the problem of privacy preservation with the resistance of Denial of Service (DoS) attacks in a practical way. In this paper, we propose a lightweight authentication protocol based on the Physically Unclonable Function (PUF) to overcome the limitations of existing schemes. The protocol provides an ingenious authentication and synchronization mechanism to solve the contradictions amount forward secrecy, DoS attacks, and resource-constrained. The performance analysis and comparison show that the proposed scheme can better improve the authentication security and efficiency for resource-constrained systems in IIoT.
引用
收藏
页码:5031 / 5040
页数:10
相关论文
共 50 条
  • [21] Three-factor authentication protocol using physical unclonable function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    COMPUTER COMMUNICATIONS, 2021, 173 : 45 - 55
  • [22] PHYSICAL UNCLONABLE FUNCTION FOR LOW COST AUTHENTICATION
    Archana, P.
    Kumar, S. Vijaya
    Venkatalakshmi, B.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1098 - 1101
  • [23] Unclonable Lightweight Authentication Scheme
    Hammouri, Ghaith
    Oeztuerk, Erdinc
    Birand, Berk
    Sunar, Berk
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 33 - 48
  • [24] IIoT Key Distribution and Authentication Technology Based on Physical Unclonable Function
    Ou, Long-Ci
    Lee, Narn-Yih
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 295 - 303
  • [25] EPUF: An Entropy-Derived Latency-Based DRAM Physical Unclonable Function for Lightweight Authentication in Internet of Things
    Najafi, Fatemeh
    Kaveh, Masoud
    Mosavi, Mohammad Reza
    Brighente, Alessandro
    Conti, Mauro
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 2422 - 2436
  • [26] Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism
    Bhatia, Kavita
    Pandey, Santosh K.
    Singh, Vivek K.
    Gupta, Deena Nath
    SENSORS, 2023, 23 (14)
  • [27] Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function
    Nozaki, Yusuke
    Yoshikawa, Masaya
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 445 - 449
  • [28] A Low Power Diode-Clamped Inverter-Based Strong Physical Unclonable Function for Robust and Lightweight Authentication
    Cao, Yuan
    Liu, Chao Qun
    Chang, Chip Hong
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2018, 65 (11) : 3864 - 3873
  • [29] An efficient authentication protocol for smart grid communication based on on-chip-error-correcting physical unclonable function
    Kaveh, Masoud
    Mosavi, Mohammad Reza
    Martin, Diego
    Aghapour, Saeed
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2023, 36
  • [30] Security analysis on “Three-factor authentication protocol using physical unclonable function for IoV”
    Ilyes Ahmim
    Nacira Ghoualmi-Zine
    Ahmed Ahmim
    Marwa Ahmim
    International Journal of Information Security, 2022, 21 : 1019 - 1026