Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings

被引:0
|
作者
Tian, Chuang [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
Li, Teng [1 ,2 ]
Zhang, Junwei [1 ,2 ]
Ma, Chengyan [1 ,2 ]
Xi, Ning [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicles; physical unclonable function; unattended IoT devices; authentication and key agreement; security protocol; UNCLONABLE FUNCTION; LAYER AUTHENTICATION; LIGHTWEIGHT; DESIGN; NOISE; INTERNET;
D O I
10.1109/TIFS.2024.3379861
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core subject of IoT applications, IoT devices have faced numerous security challenges. Especially for IoT devices deployed in remote or harsh environments, they are often unattended for long periods, making it difficult to share the sensing data and susceptible to potential physical attacks. While aerial assistance methods represented by unmanned aerial vehicles (UAVs) can solve the problem of data sharing at a low cost, it is necessary to establish a secure channel between ground control stations, UAVs, and IoT devices due to the sensitivity of the sensing data. Recently, Physical Unclonable Function (PUF) has been proven to provide unique identity identification for devices using its tamper-proof feature. In this paper, we propose a lightweight UAV-assisted authentication and key agreement protocol for unattended IoT devices, ensuring secure communication and physical tamper-proof requirements. However, our work does not stop there. We noticed that some existing PUF-based authentication schemes misunderstand the ability of PUF, which leads to these schemes cannot actually provide physical protection. We analyzed the security vulnerabilities of these schemes and proposed rules that should be followed when designing authentication protocols using PUF. In addition, for the first time, we put forward the formal definitions and proof methods for PUF in the formal proof of the security protocol, which avoided the unreasonable initial assumptions adopted in the proof of the existing schemes. We extended Mao-Boyd (MB) logic and comprehensively analyzed the proposed protocol. We also evaluate the performance of the proposed scheme, and the results show that the proposed scheme has certain advantages in communication and computation overhead compared with existing schemes.
引用
收藏
页码:4448 / 4463
页数:16
相关论文
共 50 条
  • [21] A Secure Self-Certified Broadcast Authentication Protocol for Intelligent Transportation Systems in UAV-Assisted Mobile Edge Computing Environments
    Kwon, Deokkyu
    Son, Seunghwan
    Kim, Myeonghyun
    Lee, Joonyoung
    Das, Ashok Kumar
    Park, Youngho
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 19004 - 19017
  • [22] A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN
    Gupta, Ankur
    Tripathi, Meenakshi
    Sharma, Aakar
    COMPUTER COMMUNICATIONS, 2020, 160 : 311 - 325
  • [23] Priority-Aware Fast MAC Protocol for UAV-Assisted Industrial IoT Systems
    Khisa, Shreya
    Moh, Sangman
    IEEE ACCESS, 2021, 9 : 57089 - 57106
  • [24] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [25] A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices
    Mahalat, Mahabub Hasan
    Saha, Shreya
    Mondal, Anindan
    Sen, Bibhash
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2018), 2018, : 183 - 187
  • [26] Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol
    Oliver, S. Gladson
    Purusothaman, T.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 767 - 780
  • [27] UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach
    Yin, Zhisheng
    Cheng, Nan
    Song, Yunchao
    Hui, Yilong
    Li, Yunhan
    Luan, Tom H.
    Yu, Shui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6904 - 6915
  • [28] A provably secure authentication scheme for RFID-enabled UAV applications
    Gope, Prosanta
    Millwood, Owen
    Saxena, Neetesh
    COMPUTER COMMUNICATIONS, 2021, 166 : 19 - 25
  • [29] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [30] A Relay Selection Protocol for UAV-Assisted VANETs
    He, Yixin
    Zhai, Daosen
    Wang, Dawei
    Tang, Xiao
    Zhang, Ruonan
    APPLIED SCIENCES-BASEL, 2020, 10 (23): : 1 - 16