The Improvement of PUF-Based Authentication in IoT Systems

被引:0
|
作者
Nurkifli, E. Haodudin [1 ,2 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Univ Singaperbangsa Karawang, Fac Comp Sci, Sukamakmur, West Java, Indonesia
关键词
adversary model; internet of things; authentication protocol; Physical Unclonable Function (PUF); masking method; PHYSICAL UNCLONABLE FUNCTIONS; KEY EXCHANGE; SECURITY; INTERNET;
D O I
10.12720/jait.14.5.918-927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been widely utilized in many fields, including healthcare, manufacturing, and intelligent transportation. IoT has many advantages, including the ease of collecting, accessing, and editing data remotely. Unfortunately, IoT has also given rise to many risks due to its lack of security features. Authentication protocols for IoT environments have been proposed using Physical Unclonable Functions (PUFs) to resolve security problems in IoT environments. However, we have found that these protocols have weaknesses, where the attacker steals the IoT device, obtains data from the communication channel, and has the ability to program for activating PUF, hence the attacker gets the challenge and generates a response. Therefore, we propose a new authentication protocol that resolves the issues with the existing protocol to safeguard against the attack mentioned above with PUF and masking method. We present the results of the Real or Random model (RoR model), which shows that our protocol is secure. The programming model (Scyther tool) also shows that our protocol is safe and can withstand attacks. Finally, our protocol has a low computational time.
引用
收藏
页码:918 / 927
页数:10
相关论文
共 50 条
  • [1] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [2] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    [J]. SENSORS, 2024, 24 (16)
  • [3] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    [J]. 2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43
  • [4] Multiple PUF-based lightweight authentication method in the IoT
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1198 - 1200
  • [5] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [6] PUF-based IoT Device Authentication Scheme on IoT Open Platform
    Kim, Byoungkoo
    Yoon, Seungyong
    Kang, Yousung
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1873 - 1875
  • [7] A PUF-based mutual authentication scheme for Cloud-Edges IoT systems
    Barbareschi, Mario
    De Benedictis, Alessandra
    La Montagna, Erasmo
    Mazzeo, Antonino
    Mazzocca, Nicola
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 246 - 261
  • [8] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
    Lounis, Karim
    Zulkernine, Mohammad
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
  • [9] LPA: A Lightweight PUF-based Authentication Protocol for IoT System
    Rai, Vikash Kumar
    Tripathy, Somanath
    Mathew, Jimson
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1712 - 1717
  • [10] Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    Rangasamy, Jothi
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 118 - 121