A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

被引:0
|
作者
Wan, Tao [1 ]
Ge, Jingjing [1 ]
Liao, Weichuan [2 ]
Zhao, Haixia [1 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engineer, Nanchang 330013, Jiangxi, Peoples R China
[2] East China Jiaotong Univ, Sch Sci, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Agriculture; IoT; Lightweight; PUF; Location; Continuous authentication; INTERNET; SCHEME; ROBUST;
D O I
10.1007/s11277-024-11301-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based agricultural applications are able to better monitor crops and make informed decisions about resource allocation. Ensuring data reliability is a significant challenge in agricultural IoT environments. The reliability of collected data is subject to situational characteristics of IoT devices, such as their location, which can be easily compromised by environmental and human factors. To address this issue, location-based device authentication has been proposed as a means of ensuring data reliability. Currently, Physical Unclonable Function (PUF) is also widely used in IoT authentication mechanisms. In this paper, we propose a lightweight two-factor continuous authentication protocol based on PUF and location. The proposed protocol leverages the properties of PUF to resist physical attacks, uses simple cryptographic operations such as XORs and hash functions to ensure security, and reduces resource consumption through continuous authentication. A formal security analysis of the proposed scheme is performed using Burrows-Abadi-Needham (BAN) logic analysis. The informal security analysis of the proposed scheme demonstrates that it is resistant to several known attacks. Additionally, we further evaluate the performance of the proposed scheme. The results demonstrate that the proposed scheme has low communication and computational costs, and offers better security and functionality attributes.
引用
收藏
页码:921 / 945
页数:25
相关论文
共 50 条
  • [21] A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
    Fotouhi, Mahdi
    Bayat, Majid
    Das, Ashok Kumar
    Far, Hossein Abdi Nasib
    Pournaghi, S. Morteza
    Doostari, M. A.
    COMPUTER NETWORKS, 2020, 177
  • [22] Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments
    Wang, Ping
    Li, Bin
    Shi, Hongjin
    Shen, Yaosheng
    Wang, Ding
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [23] Design of a lightweight two-factor authentication scheme with smart card revocation
    Mishra, Dheerendra
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 44 - 53
  • [24] A secure lightweight two-factor authentication scheme in global mobility networks
    Madhusudhan, R.
    Suvidha, K. S.
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2019, 9 (02) : 109 - 123
  • [25] Lightweight Authentication for IOT Edge Devices
    Zerraza, Imane
    Informatica (Slovenia), 2024, 48 (18): : 15 - 20
  • [26] Lightweight two-factor authentication framework with privacy preserving for smart eHealth
    Rao, Patruni Muralidhara
    Deebak, B. D.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 373 - 396
  • [27] A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
    Wang, Chenyu
    Xu, Guoai
    Li, Wenting
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [28] Lightweight two-factor authentication framework with privacy preserving for smart eHealth
    Patruni Muralidhara Rao
    B. D. Deebak
    Peer-to-Peer Networking and Applications, 2024, 17 : 373 - 396
  • [29] Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security
    Choi, Dooho
    Seo, Seung-Hyun
    Oh, Yoon-Seok
    Kang, Yousung
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 335 - 348
  • [30] An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
    Qiu, Shuming
    Xu, Guosheng
    Ahmad, Haseeb
    Xu, Guoai
    Qiu, Xinping
    Xu, Hong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 978 - 1002