The Improvement of PUF-Based Authentication in IoT Systems

被引:0
|
作者
Nurkifli, E. Haodudin [1 ,2 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan
[2] Univ Singaperbangsa Karawang, Fac Comp Sci, Sukamakmur, West Java, Indonesia
关键词
adversary model; internet of things; authentication protocol; Physical Unclonable Function (PUF); masking method; PHYSICAL UNCLONABLE FUNCTIONS; KEY EXCHANGE; SECURITY; INTERNET;
D O I
10.12720/jait.14.5.918-927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has been widely utilized in many fields, including healthcare, manufacturing, and intelligent transportation. IoT has many advantages, including the ease of collecting, accessing, and editing data remotely. Unfortunately, IoT has also given rise to many risks due to its lack of security features. Authentication protocols for IoT environments have been proposed using Physical Unclonable Functions (PUFs) to resolve security problems in IoT environments. However, we have found that these protocols have weaknesses, where the attacker steals the IoT device, obtains data from the communication channel, and has the ability to program for activating PUF, hence the attacker gets the challenge and generates a response. Therefore, we propose a new authentication protocol that resolves the issues with the existing protocol to safeguard against the attack mentioned above with PUF and masking method. We present the results of the Real or Random model (RoR model), which shows that our protocol is secure. The programming model (Scyther tool) also shows that our protocol is safe and can withstand attacks. Finally, our protocol has a low computational time.
引用
收藏
页码:918 / 927
页数:10
相关论文
共 50 条
  • [21] An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
    Ebrahimabadi, Mohammad
    Younis, Mohamed
    Lalouani, Wassila
    Karimi, Naghmeh
    [J]. 2022 35TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID 2022) HELD CONCURRENTLY WITH 2022 21ST INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (ES 2022), 2022, : 108 - 113
  • [22] A PUF-based cryptographic security solution for IoT systems on chip
    Balan, Alexandra
    Balan, Titus
    Cirstea, Marcian
    Sandu, Florin
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [23] Optimal Tradeoff of Secure PUF-based Authentication
    Kittichokechai, Kittipong
    Caire, Giuseppe
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 83 - 88
  • [24] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
  • [25] A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT
    Li, Sensen
    Huang, Yicai
    Yu, Bin
    [J]. COMPUTER NETWORKS, 2024, 247
  • [26] Quantum cloning attacks against PUF-based quantum authentication systems
    Yao, Yao
    Gao, Ming
    Li, Mo
    Zhang, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (08) : 3311 - 3325
  • [27] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [28] Quantum cloning attacks against PUF-based quantum authentication systems
    Yao Yao
    Ming Gao
    Mo Li
    Jian Zhang
    [J]. Quantum Information Processing, 2016, 15 : 3311 - 3325
  • [29] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
  • [30] PUF-Based Lightweight Authentication Framework for Large-Scale IoT Devices in Distributed Cloud
    Li, Dawei
    Liu, Di
    Qi, Yiren
    Liu, Feifei
    Guan, Zhenyu
    Liu, Jianwei
    [J]. IEEE NETWORK, 2023, 37 (04): : 56 - 62