Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings

被引:0
|
作者
Tian, Chuang [1 ,2 ]
Ma, Jianfeng [1 ,2 ]
Li, Teng [1 ,2 ]
Zhang, Junwei [1 ,2 ]
Ma, Chengyan [1 ,2 ]
Xi, Ning [1 ,2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Unmanned aerial vehicles; physical unclonable function; unattended IoT devices; authentication and key agreement; security protocol; UNCLONABLE FUNCTION; LAYER AUTHENTICATION; LIGHTWEIGHT; DESIGN; NOISE; INTERNET;
D O I
10.1109/TIFS.2024.3379861
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the core subject of IoT applications, IoT devices have faced numerous security challenges. Especially for IoT devices deployed in remote or harsh environments, they are often unattended for long periods, making it difficult to share the sensing data and susceptible to potential physical attacks. While aerial assistance methods represented by unmanned aerial vehicles (UAVs) can solve the problem of data sharing at a low cost, it is necessary to establish a secure channel between ground control stations, UAVs, and IoT devices due to the sensitivity of the sensing data. Recently, Physical Unclonable Function (PUF) has been proven to provide unique identity identification for devices using its tamper-proof feature. In this paper, we propose a lightweight UAV-assisted authentication and key agreement protocol for unattended IoT devices, ensuring secure communication and physical tamper-proof requirements. However, our work does not stop there. We noticed that some existing PUF-based authentication schemes misunderstand the ability of PUF, which leads to these schemes cannot actually provide physical protection. We analyzed the security vulnerabilities of these schemes and proposed rules that should be followed when designing authentication protocols using PUF. In addition, for the first time, we put forward the formal definitions and proof methods for PUF in the formal proof of the security protocol, which avoided the unreasonable initial assumptions adopted in the proof of the existing schemes. We extended Mao-Boyd (MB) logic and comprehensively analyzed the proposed protocol. We also evaluate the performance of the proposed scheme, and the results show that the proposed scheme has certain advantages in communication and computation overhead compared with existing schemes.
引用
收藏
页码:4448 / 4463
页数:16
相关论文
共 50 条
  • [31] An improved and provably secure privacy preserving authentication protocol for SIP
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Sher, Muhammad
    Farash, Mohammad Sabzinejad
    ul Hassan, Mahmood
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 1 - 15
  • [32] A provably secure anonymous authentication scheme for Session Initiation Protocol
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Irshad, Azeem
    Ashraf, Muhammad Usman
    Khan, Muhammad Khurram
    Ahmad, Hafiz Farooq
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5016 - 5027
  • [33] Provably secure fog-based authentication protocol for VANETs
    Awais, Syed Muhammad
    Yucheng, Wu
    Mahmood, Khalid
    Badar, Hafiz Muhammad Sanaullah
    Kharel, Rupak
    Das, Ashok Kumar
    COMPUTER NETWORKS, 2024, 246
  • [34] A provably secure group authentication protocol for various LTE networks
    Kijjabuncha, Boriphat
    Hiranvanichakorn, Pipat
    International Journal of Network Security, 2019, 21 (06): : 957 - 970
  • [35] Provably Secure Access Authentication Protocol under Universal Network
    Zheng, Lijuan
    Han, Zhen
    Zhang, Rui
    Fan, Tongrang
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 371 - +
  • [36] An improved and provably secure privacy preserving authentication protocol for SIP
    Shehzad Ashraf Chaudhry
    Husnain Naqvi
    Muhammad Sher
    Mohammad Sabzinejad Farash
    Mahmood Ul Hassan
    Peer-to-Peer Networking and Applications, 2017, 10 : 1 - 15
  • [37] Secure Load Balancing for UAV-Assisted Wireless Networks
    Zhai, Daosen
    Li, Huan
    Tang, Xiao
    Wang, Dawei
    Cao, Haotong
    Zhang, Peiying
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [38] AI for UAV-Assisted IoT Applications: A Comprehensive Review
    Cheng, Nan
    Wu, Shen
    Wang, Xiucheng
    Yin, Zhisheng
    Li, Changle
    Chen, Wen
    Chen, Fangjiong
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (16) : 14438 - 14461
  • [39] Secure Load Balancing for UAV-Assisted Wireless Networks
    Zhai, Daosen
    Li, Huan
    Tang, Xiao
    Wang, Dawei
    Cao, Haotong
    Zhang, Peiying
    Proceedings - IEEE Global Communications Conference, GLOBECOM, 2021,
  • [40] Resource Allocation for Secure UAV-Assisted SWIPT Systems
    Hong, Xianggong
    Liu, Pengpeng
    Zhou, Fuhui
    Guo, Sen
    Chu, Zheng
    IEEE ACCESS, 2019, 7 : 24248 - 24257