PUF-based Authentication Protocol with Physical Layer-based Obfuscated Challenge-Response Pair

被引:1
|
作者
Alkanhal, Mona [1 ]
Alali, Abdulaziz [2 ]
Younis, Mohamed [1 ]
机构
[1] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[2] Howard Univ, Washington, DC USA
关键词
Internet of things (IoT); Physical Unclonable Functions (PUFs); authentication; Physical layer security;
D O I
10.1109/ICC45041.2023.10278899
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Node authentication is essential in IoT systems where interconnected resource-constrained devices operate autonomously. Developing a lightweight authentication technique is requisite to prevent malicious nodes from joining the network and impersonating legitimate nodes. This paper develops a novel protocol to enable mutual authentication for node pairs. The protocol combines the advantage of hardware-based security primitives, namely physically unclonable functions (PUFs), and agility and configurability of physical-layer communication mechanisms, specifically the Multi-Input Multi-Output (MIMO) method. Distinct from existing PUF-based techniques, our protocol allows two devices to mutually authenticate each other without the involvement of an intermediary server. Moreover, the proposed protocol encodes the transmitted information to protect it from any possible eavesdropping attempts that aim to model the PUF of a legitimate node. The experimental results demonstrate the efficacy of the proposed protocol against modeling attacks and impersonation attempts.
引用
收藏
页码:5867 / 5872
页数:6
相关论文
共 50 条
  • [1] Obfuscated Challenge-Response: A Secure Lightweight Authentication Mechanism for PUF-Based Pervasive Devices
    Gao, Yansong
    Li, Gefei
    Ma, Hua
    Al-Sarawi, Said F.
    Kavehei, Omid
    Abbott, Derek
    Ranasinghe, Damith C.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [2] Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs
    Khavari, Mani
    Baur, Sebastian
    Boche, Holger
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 575 - 579
  • [3] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
  • [4] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [5] A Double PUF-Based RFID Authentication Protocol
    Li, Tao
    Liu, Yali
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [6] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [7] A PUF-based Mutual Authentication Protocol for Internet of Things
    Satamraju, Krishna Prasad
    Malarkodi, B.
    [J]. PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [8] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    [J]. 2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43
  • [9] Proving authentication property of PUF-based mutual authentication protocol based on logic of events
    Song, Jiawen
    Xiao, Meihua
    Zhang, Tong
    Zhou, Haoyang
    [J]. SOFT COMPUTING, 2022, 26 (02) : 841 - 852
  • [10] Challenging the security of "A PUF-based hardware mutual authentication protocol"
    Adeli, Morteza
    Bagheri, Nasour
    Martin, Honorio
    Peris-Lopez, Pedro
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 : 199 - 210