On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices

被引:2
|
作者
Sun, Da-Zhi [1 ]
Gao, Yi-Na [1 ]
Tian, Yangguang [2 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin Key Lab Adv Networking TANK, Tianjin 300350, Peoples R China
[2] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
基金
中国国家自然科学基金;
关键词
physically unclonable function; authentication; key exchange; insider attack; surveillance; impersonation; MUTUAL AUTHENTICATION;
D O I
10.3390/s23146559
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    [J]. 2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43
  • [2] PUF-based mutual authentication and session key establishment protocol for IoT devices
    Zerrouki F.
    Ouchani S.
    Bouarfa H.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (09) : 12575 - 12593
  • [3] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10): : 8547 - 8559
  • [4] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [5] Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    Rangasamy, Jothi
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 118 - 121
  • [6] PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
    Zheng, Yue
    Liu, Wenye
    Gu, Chongyan
    Chang, Chip-Hong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3299 - 3316
  • [7] A PUF-Based Indirect Authentication and Key Establishment Protocol for Wearable Devices
    Sathi, Vipin N.
    Rohner, Christian
    Voigt, Thiemo
    [J]. ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 615 - 621
  • [8] Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Rostampour, Samad
    [J]. FUTURE INTERNET, 2024, 16 (01)
  • [9] PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices
    Raj, Kamal
    Bodapati, Srinivasu
    Chattopadhyay, Anupam
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [10] A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices
    Ebrahimabadi, Mohammad
    Younis, Mohamed
    Karimi, Naghmeh
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05): : 3684 - 3703