A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

被引:0
|
作者
Wan, Tao [1 ]
Ge, Jingjing [1 ]
Liao, Weichuan [2 ]
Zhao, Haixia [1 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engineer, Nanchang 330013, Jiangxi, Peoples R China
[2] East China Jiaotong Univ, Sch Sci, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Agriculture; IoT; Lightweight; PUF; Location; Continuous authentication; INTERNET; SCHEME; ROBUST;
D O I
10.1007/s11277-024-11301-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based agricultural applications are able to better monitor crops and make informed decisions about resource allocation. Ensuring data reliability is a significant challenge in agricultural IoT environments. The reliability of collected data is subject to situational characteristics of IoT devices, such as their location, which can be easily compromised by environmental and human factors. To address this issue, location-based device authentication has been proposed as a means of ensuring data reliability. Currently, Physical Unclonable Function (PUF) is also widely used in IoT authentication mechanisms. In this paper, we propose a lightweight two-factor continuous authentication protocol based on PUF and location. The proposed protocol leverages the properties of PUF to resist physical attacks, uses simple cryptographic operations such as XORs and hash functions to ensure security, and reduces resource consumption through continuous authentication. A formal security analysis of the proposed scheme is performed using Burrows-Abadi-Needham (BAN) logic analysis. The informal security analysis of the proposed scheme demonstrates that it is resistant to several known attacks. Additionally, we further evaluate the performance of the proposed scheme. The results demonstrate that the proposed scheme has low communication and computational costs, and offers better security and functionality attributes.
引用
收藏
页码:921 / 945
页数:25
相关论文
共 50 条
  • [31] Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
    Oliver, S. Gladson
    Purusothaman, T.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 767 - 780
  • [32] Analysis of lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
    Alsahlani, Ahmed Yaser Fahad
    Popa, Alexandru
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 475 - 480
  • [33] TWO-FACTOR AUTHENTICATION SYSTEM
    Tsymzhitov, Gonchik
    Zudilova, Tatiana
    Voituk, Tatiana
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 505 - 512
  • [34] On the Usability of Two-Factor Authentication
    Wang, Ding
    Wang, Ping
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 141 - 150
  • [35] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu Zhou
    Chunpeng Ge
    Chunhua Su
    Science China Information Sciences, 2020, 63
  • [36] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [37] A novel two-factor multi-gateway authentication protocol for WSNs
    Chen, Chen
    Guo, Hua
    Wu, Yapeng
    Gao, Ya
    Liu, Jianwei
    AD HOC NETWORKS, 2023, 141
  • [38] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [39] A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices
    Ayub, Muhammad Faizan
    Shamshad, Salman
    Mahmood, Khalid
    Islam, S. K. Hafizul
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2020, 66 (04) : 396 - 405
  • [40] BlinKey: A Two-Factor User Authentication Method for Virtual Reality Devices
    Zhu, Huadi
    Jin, Wenqiang
    Xiao, Mingyan
    Murali, Srinivasan
    Li, Ming
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (04):