PUF-based Authentication Scheme for IoT Devices

被引:0
|
作者
Yoon, Seungyong [1 ]
Kim, Byoungkoo [1 ]
Kang, Yousung [1 ]
Choi, Dooho [1 ]
机构
[1] Elect & Telecommun Res Inst, Cryptog Engn Res Sect, Daejeon, South Korea
关键词
IoT; device; PUF; authentication; PHYSICAL UNCLONABLE FUNCTIONS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is about mutual authentication technology between devices with minimal user intervention in a large-scale IoT environment using PUF (Physical Unclonable Function). Most of the existing authentication schmes have been studied focusing only on device-to-server authentication, but the proposed method provides a mutual authentication between devices and devices that utilize the authentication server as a reliable intermediary. We can defend against information leakage, replay attacks, man-in-the- middle attacks, physical attacks, and machine learning based modeling attacks that can occur from various security threats of IoT devices through the proposed method in this paper.
引用
收藏
页码:1792 / 1794
页数:3
相关论文
共 50 条
  • [41] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [42] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
  • [43] PUF-based Node Mutual Authentication Scheme for Delay Tolerant Mobile Sensor Network
    Yang, Kuiwu
    Zheng, Kangfeng
    Guo, Yuanbo
    Wei, Dawei
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [44] Protection Profile for PUF-Based Devices
    Kolberger, Andrea
    Schaumueller-Bichl, Ingrid
    Brunner, Verena
    Deutschmann, Martin
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 91 - 98
  • [45] DC-PUF: Machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices
    Sajadi, Abolfazl
    Shabani, Ahmad
    Alizadeh, Bijan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 217
  • [46] A PUF-based unified identity verification framework for secure IoT hardware via device authentication
    Zhao Huang
    Quan Wang
    [J]. World Wide Web, 2020, 23 : 1057 - 1088
  • [47] A PUF-based Identity Authentication Method for Wireless Sensor Network Devices in Power System
    Wang, Ying
    Zheng, Weijun
    Tang, Jinjiang
    Sun, Feng
    Xu, Chen
    Du, Bin
    An, Chunyan
    [J]. 2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 205 - 210
  • [48] Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks
    Najafi, Fatemeh
    Kaveh, Masoud
    Martin, Diego
    Reza Mosavi, Mohammad
    [J]. SENSORS, 2021, 21 (06) : 1 - 16
  • [49] PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
    Mall, Priyanka
    Amin, Ruhul
    Das, Ashok Kumar
    Leung, Mark T.
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11): : 8205 - 8228
  • [50] A PUF-based unified identity verification framework for secure IoT hardware via device authentication
    Huang, Zhao
    Wang, Quan
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 1057 - 1088