On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices

被引:2
|
作者
Sun, Da-Zhi [1 ]
Gao, Yi-Na [1 ]
Tian, Yangguang [2 ]
机构
[1] Tianjin Univ, Coll Intelligence & Comp, Tianjin Key Lab Adv Networking TANK, Tianjin 300350, Peoples R China
[2] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
基金
中国国家自然科学基金;
关键词
physically unclonable function; authentication; key exchange; insider attack; surveillance; impersonation; MUTUAL AUTHENTICATION;
D O I
10.3390/s23146559
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] The Improvement of PUF-Based Authentication in IoT Systems
    Nurkifli, E. Haodudin
    Hwang, Tzonelih
    [J]. JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 918 - 927
  • [22] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475
  • [23] PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
    Lee, JoonYoung
    Oh, JiHyeon
    Kwon, DeokKyu
    Kim, MyeongHyun
    Yu, SungJin
    Jho, Nam-Su
    Park, Youngho
    [J]. SENSORS, 2022, 22 (18)
  • [24] PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol
    Yildiz, Husnu
    Cenk, Murat
    Onur, Ertan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5682 - 5696
  • [25] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234
  • [26] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [27] A Double PUF-Based RFID Authentication Protocol
    Li, Tao
    Liu, Yali
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (08): : 1801 - 1810
  • [28] A PUF-based lightweight authentication and key agreement protocol for smart UAV networks
    Zhang, Li
    Xu, Jianbo
    Obaidat, Mohammad S.
    Li, Xiong
    Vijayakumar, Pandi
    [J]. IET COMMUNICATIONS, 2022, 16 (10) : 1142 - 1159
  • [29] Multiple PUF-based lightweight authentication method in the IoT
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    [J]. 12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 1198 - 1200
  • [30] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)