Lightweight PUF based authentication scheme for fog architecture

被引:15
|
作者
De Smet, Ruben [1 ]
Vandervelden, Thibaut [2 ]
Steenhaut, Kris [1 ,2 ]
Braeken, An [2 ]
机构
[1] Vrije Univ Brussel, ETRO, Pl Laan 2, Brussels, Belgium
[2] Vrije Univ Brussel, INDI, Pl Laan 2, Brussels, Belgium
关键词
Fog architecture; Physical unclonable functions; Key agreement scheme; Multi-factor authentication; COMPUTING ARCHITECTURE; SECURITY; PROTOCOL;
D O I
10.1007/s11276-020-02491-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly available places, they can be easily captured. Therefore, it should be ensured that even if the key material is leaked from the fog devices, the previously generated session keys and the identity of the devices can be kept secret, i.e. satisfying anonymity, unlinkability, perfect forward secrecy and resistance against stolen devices attack. Such demands require a multi-factor authentication scheme, which is typically done by providing input of the user with password or biometric data. However, in real use case scenarios, IoT devices should be able to automatically start the process without requiring such manual interaction and also fog devices need to autonomously operate. Therefore, this paper proposes a physical unclonable function (PUF) based mutual authentication scheme, being the first security scheme for a fog architecture, capable of providing simultaneously all these suggested security features. In addition, we also show the resistance against other types of attacks like synchronization and known session specific temporary information attack. Moreover, the scheme only relies on symmetric key based operations and thus results in very good performance, compared to the other fog based security systems proposed in literature.
引用
收藏
页码:947 / 959
页数:13
相关论文
共 50 条
  • [31] Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme
    Gong, Xiang
    Kou, Ting
    Li, Yan
    SYMMETRY-BASEL, 2024, 16 (10):
  • [32] Bilinear Pairing and PUF Based Lightweight Authentication Protocol for IoD Environment
    Pu, Cong
    Wall, Andrew
    Choo, Kim-Kwang Raymond
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2022), 2022, : 115 - 121
  • [33] A Lightweight RFID Mutual Authentication Protocol with PUF
    Zhu, Feng
    Li, Peng
    Xu, He
    Wang, Ruchuan
    SENSORS, 2019, 19 (13)
  • [34] A PUF-based lightweight identity authentication protocol for Internet of Vehicles
    Men, Honglei
    Cao, Li
    Zheng, Guoli
    Chen, Liang
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [35] A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
    Almuhaideb, Abdullah M.
    Alqudaihi, Kawther S.
    SENSORS, 2020, 20 (23) : 1 - 31
  • [36] A Distributed Lightweight PUF-Based Mutual Authentication Protocol for IoV
    Alkanhal, Mona
    Alali, Abdulaziz
    Younis, Mohamed
    IOT, 2024, 5 (01): : 1 - 19
  • [37] LPA: A Lightweight PUF-based Authentication Protocol for IoT System
    Rai, Vikash Kumar
    Tripathy, Somanath
    Mathew, Jimson
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1712 - 1717
  • [38] PufParkChain: Secure and Smart Parking Based on PUF Authentication and Lightweight Blockchain
    Turki, Mariem
    Dammak, Bouthaina
    Alshahrani, Amnah
    IEEE ACCESS, 2024, 12 : 65754 - 65767
  • [39] Lightweight Secure Authentication Scheme to thwart Unauthorized Edge Datacenters in Fog Computing
    Premkumar, N.
    Kumar, B. Santhosh
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 139 (01) : 167 - 181
  • [40] A puf-based three-party authentication key establishment scheme for fog-enabled smart home
    Yang, Huan
    Guo, Yajun
    Guo, Yimin
    PERVASIVE AND MOBILE COMPUTING, 2023, 95