A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

被引:0
|
作者
Wan, Tao [1 ]
Ge, Jingjing [1 ]
Liao, Weichuan [2 ]
Zhao, Haixia [1 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engineer, Nanchang 330013, Jiangxi, Peoples R China
[2] East China Jiaotong Univ, Sch Sci, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Agriculture; IoT; Lightweight; PUF; Location; Continuous authentication; INTERNET; SCHEME; ROBUST;
D O I
10.1007/s11277-024-11301-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based agricultural applications are able to better monitor crops and make informed decisions about resource allocation. Ensuring data reliability is a significant challenge in agricultural IoT environments. The reliability of collected data is subject to situational characteristics of IoT devices, such as their location, which can be easily compromised by environmental and human factors. To address this issue, location-based device authentication has been proposed as a means of ensuring data reliability. Currently, Physical Unclonable Function (PUF) is also widely used in IoT authentication mechanisms. In this paper, we propose a lightweight two-factor continuous authentication protocol based on PUF and location. The proposed protocol leverages the properties of PUF to resist physical attacks, uses simple cryptographic operations such as XORs and hash functions to ensure security, and reduces resource consumption through continuous authentication. A formal security analysis of the proposed scheme is performed using Burrows-Abadi-Needham (BAN) logic analysis. The informal security analysis of the proposed scheme demonstrates that it is resistant to several known attacks. Additionally, we further evaluate the performance of the proposed scheme. The results demonstrate that the proposed scheme has low communication and computational costs, and offers better security and functionality attributes.
引用
收藏
页码:921 / 945
页数:25
相关论文
共 50 条
  • [41] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Lu ZHOU
    Chunpeng GE
    Chunhua SU
    ScienceChina(InformationSciences), 2020, 63 (03) : 34 - 48
  • [42] A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
    Zhou, Lu
    Ge, Chunpeng
    Su, Chunhua
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (03)
  • [43] A Lightweight Authentication Mechanism between IoT Devices
    Han, Jin-Hee
    Kim, JeongNyeo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1153 - 1155
  • [44] Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [45] A two-factor security authentication scheme for wireless sensor networks in IoT environments
    Hu, Bin
    Tang, Wen
    Xie, Qi
    NEUROCOMPUTING, 2022, 500 : 741 - 749
  • [46] A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT
    Kou, Liang
    Shi, Yiqi
    Zhang, Liguo
    Liu, Duo
    Yang, Qing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 58 (02): : 545 - 565
  • [47] PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices
    Raj, Kamal
    Bodapati, Srinivasu
    Chattopadhyay, Anupam
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [48] LAAP: Lightweight Anonymous Authentication Protocol for IoT Edge Devices Based on Elliptic Curve
    Zhu, Xinghui
    Ren, Zhong
    He, Ji
    Ren, Baoquan
    Zhao, Shuangrui
    Zhang, Pinchang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [49] On the Security of a Two-Factor Authentication Scheme
    Catuogno, Luigi
    Galdi, Clemente
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 245 - +
  • [50] The Case for Mobile Two-Factor Authentication
    DeFigueiredo, Dimitri
    IEEE SECURITY & PRIVACY, 2011, 9 (05) : 81 - 85