Multifactor authentication scheme using physically unclonable functions

被引:12
|
作者
Fakroon, Moneer [1 ]
Gebali, Fayez [1 ]
Mamun, Mohammad [2 ]
机构
[1] Victoria Univ, Victoria, BC, Canada
[2] Govt Canada, Natl Res Council Canada, Fredericton, NB, Canada
关键词
Internet of Things; Device authentication; Hardware security; Embedded systems; PUF; AVISPA; BAN; Three-factor authentication; GENERATE STRONG KEYS; FUZZY EXTRACTORS; PROTOCOL; LIGHTWEIGHT; BIOMETRICS; INTERNET;
D O I
10.1016/j.iot.2020.100343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a secure telehealth system using multifactor authentication for the mobile devices as well as the IoT edge devices in the system. These two types of devices constitute the weakest link in telehealth systems. The mobile devices and edge devices are typically unsecured and contain vulnerable processors. The mobile devices use the healthcare professional's biometric and endowing the edge device with biometrics is accomplished by using physically unclonable functions (PUFs). The embedded PUF acts as a means of enabling mutual authentication and key exchange. Evaluating the security of the proposed authentication scheme is conducted using three approaches: (a) formal analysis based on Burrows-Abadi-Needham logic (BAN); (b) informal security analysis for protection against many attack types.; (c) model checking using automated validation of internet security protocols and applications (AVISPA) tool. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Robust Authentication Using Physically Unclonable Functions
    Frikken, Keith B.
    Blanton, Marina
    Atallah, Mikhail J.
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 262 - +
  • [2] A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions
    Wang, Pingchuan
    Zhang, Lupeng
    Pan, Jinhao
    Li, Fengqi
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 579 - 590
  • [3] Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids
    Safkhani, Masoumeh
    Bagheri, Nasour
    Ali, Saqib
    Hussain Malik, Mazhar
    Hassan Ahmed, Omed
    Hosseinzadeh, Mehdi
    Mosavi, Amir H.
    [J]. MATHEMATICS, 2023, 11 (01)
  • [4] A Robust Authentication Methodology Using Physically Unclonable Functions in DRAM Arrays
    Hashemian, Maryam S.
    Singh, Bhanu
    Wolff, Francis
    Weyer, Daniel
    Clay, Steve
    Papachristou, Christos
    [J]. 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 647 - 652
  • [5] A White-Box Encryption Scheme using Physically Unclonable Functions
    Rasoamiaramanana, Sandra
    Minier, Marine
    Macario-Rat, Gilles
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 279 - 286
  • [6] Investigation of Physically Unclonable Functions Using Flash Memory for Integrated Circuit Authentication
    Kim, Moon-Seok
    Moon, Dong-Il
    Yoo, Sang-Kyung
    Lee, Sang-Han
    Choi, Yang-Kyu
    [J]. IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2015, 14 (02) : 384 - 389
  • [7] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2019, 7 : 85627 - 85644
  • [8] HELPER-LESS PHYSICALLY UNCLONABLE FUNCTIONS AND CHIP AUTHENTICATION
    Bernardini, Riccardo
    Rinaldo, Roberto
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [9] Scalable RFID authentication protocol based on physically unclonable functions
    Kurt, Isil
    Alagoz, Fatih
    Akguen, Mete
    [J]. COMPUTER NETWORKS, 2023, 230
  • [10] Physically Unclonable Fingerprints for Authentication
    Baban, Navajit S.
    Zhou, Jiarui
    Bhattacharya, Sarani
    Chatterjee, Urbi
    Bhattacharjee, Sukanta
    Vijayavenkataraman, Sanjairaj
    Song, Yong-Ak
    Mukhopadhyay, Debdeep
    Chakrabarty, Krishnendu
    Karri, Ramesh
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 235 - 239