Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings

被引:0
|
作者
Tian, Chuang [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
Li, Teng [1 ,2 ]
Zhang, Junwei [1 ,2 ]
Ma, Chengyan [1 ,2 ]
Xi, Ning [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicles; physical unclonable function; unattended IoT devices; authentication and key agreement; security protocol; UNCLONABLE FUNCTION; LAYER AUTHENTICATION; LIGHTWEIGHT; DESIGN; NOISE; INTERNET;
D O I
10.1109/TIFS.2024.3379861
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core subject of IoT applications, IoT devices have faced numerous security challenges. Especially for IoT devices deployed in remote or harsh environments, they are often unattended for long periods, making it difficult to share the sensing data and susceptible to potential physical attacks. While aerial assistance methods represented by unmanned aerial vehicles (UAVs) can solve the problem of data sharing at a low cost, it is necessary to establish a secure channel between ground control stations, UAVs, and IoT devices due to the sensitivity of the sensing data. Recently, Physical Unclonable Function (PUF) has been proven to provide unique identity identification for devices using its tamper-proof feature. In this paper, we propose a lightweight UAV-assisted authentication and key agreement protocol for unattended IoT devices, ensuring secure communication and physical tamper-proof requirements. However, our work does not stop there. We noticed that some existing PUF-based authentication schemes misunderstand the ability of PUF, which leads to these schemes cannot actually provide physical protection. We analyzed the security vulnerabilities of these schemes and proposed rules that should be followed when designing authentication protocols using PUF. In addition, for the first time, we put forward the formal definitions and proof methods for PUF in the formal proof of the security protocol, which avoided the unreasonable initial assumptions adopted in the proof of the existing schemes. We extended Mao-Boyd (MB) logic and comprehensively analyzed the proposed protocol. We also evaluate the performance of the proposed scheme, and the results show that the proposed scheme has certain advantages in communication and computation overhead compared with existing schemes.
引用
收藏
页码:4448 / 4463
页数:16
相关论文
共 50 条
  • [1] A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue
    Cui, Jie
    Liu, Xinzhong
    Zhong, Hong
    Zhang, Jing
    Wei, Lu
    Bolodurina, Irina
    He, Debiao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 1454 - 1468
  • [2] A UAV-Assisted Authentication Protocol for Internet of Vehicles
    Miao, Junfeng
    Wang, Zhaoshun
    Ning, Xin
    Shankar, Achyut
    Maple, Carsten
    Rodrigues, Joel J. P. C.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (08) : 1 - 12
  • [3] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Bahaa Hussein Taher Algubili
    Neeraj Kumar
    Hongwei Lu
    Ali A. Yassin
    Rihab Boussada
    Alzahraa J. Mohammed
    Huiyu Liu
    Peer-to-Peer Networking and Applications, 2022, 15 : 2179 - 2198
  • [4] EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
    Algubili, Bahaa Hussein Taher
    Kumar, Neeraj
    Lu, Hongwei
    Yassin, Ali A.
    Boussada, Rihab
    Mohammed, Alzahraa J.
    Liu, Huiyu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (05) : 2179 - 2198
  • [5] Verifying a secure authentication protocol for IoT medical devices
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1985 - 1990
  • [6] Verifying a secure authentication protocol for IoT medical devices
    Woo-Sik Bae
    Cluster Computing, 2019, 22 : 1985 - 1990
  • [7] Resource Allocation of UAV-Assisted IoT Node Secure Communication System
    Ma, Biyun
    Xu, Diyuan
    Ren, Xinyu
    Wang, Yide
    Liu, Jiaojiao
    SIGNALS, 2023, 4 (03): : 591 - 603
  • [8] Physically Secure Mutual Authentication for IoT
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 310 - 317
  • [9] UAV-assisted wireless charging and data processing of power IoT devices
    Lyu, Ting
    An, Jianwei
    Li, Meng
    Liu, Feifei
    Xu, Haitao
    COMPUTING, 2024, 106 (03) : 789 - 819
  • [10] AoI-minimization in UAV-assisted IoT Network with Massive Devices
    Zhang, Jianhang
    Kang, Kai
    Yang, Miao
    Zhu, Hongbin
    Qian, Hua
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1290 - 1295