PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey

被引:69
|
作者
Mall, Priyanka [1 ]
Amin, Ruhul [2 ]
Das, Ashok Kumar [3 ]
Leung, Mark T. [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] IIIT Naya Raipur, Dept Elect & Commun Engn, Chattisgarh 892002, India
[2] IIIT Naya Raipur, Dept Comp Sci & Engn, Chattisgarh 892002, India
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Texas San Antonio, Dept Management Sci & Stat, San Antonio, TX 78249 USA
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 11期
关键词
Protocols; Authentication; Wireless sensor networks; Smart grids; Internet of Things; Cryptography; Mathematical models; Authentication and key agreement (AKA); physically unclonable function (PUF); smart grid; wireless sensor networks (WSNs); WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; MUTUAL AUTHENTICATION; PROVABLY SECURE; EXCHANGE PROTOCOL; SCHEME; LIGHTWEIGHT; INTERNET; 5G; SYSTEMS;
D O I
10.1109/JIOT.2022.3142084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function, which maps inherent properties of the hardware devices to a unique bit stream of information. Authentication and key agreement (AKA) protocols are widely used in electronic commerce, electronic stock trading, and many secured business transaction platforms, because they allow the communicating devices to mutually authenticate each other while exchanging authenticated session key (or secret key) that can be used subsequently to establish a secured communication channel. Yet, these protocols are also vulnerable to a broad range of security outbreaks. In light of these notions and practical applications, this article is intended to: 1) provide an overview of AKA protocols, PUF plus the combined PUF-based AKA; 2) systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast growing areas of Internet of Things, wireless sensor networks, and smart grids based on a meticulous survey of the existing literature; 3) summarize the challenges to deployment and potential security risks of the underlying technologies and possible remedies or mitigation strategies; and 4) to conduct and report a comparative performance and security analysis with respect to the three focused areas.
引用
收藏
页码:8205 / 8228
页数:24
相关论文
共 50 条
  • [1] Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    Rangasamy, Jothi
    [J]. IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 118 - 121
  • [2] Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Rostampour, Samad
    [J]. FUTURE INTERNET, 2024, 16 (01)
  • [3] A PUF-based lightweight authentication and key agreement protocol for smart UAV networks
    Zhang, Li
    Xu, Jianbo
    Obaidat, Mohammad S.
    Li, Xiong
    Vijayakumar, Pandi
    [J]. IET COMMUNICATIONS, 2022, 16 (10) : 1142 - 1159
  • [4] Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
    Lounis, Karim
    Zulkernine, Mohammad
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (02):
  • [5] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Chen, Liquan
    Wang, Jinlong
    Yin, Bangwei
    Yu, Kunliang
    Han, Jinguang
    [J]. CHINA COMMUNICATIONS, 2023, 20 (05) : 198 - 216
  • [6] A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
    Liquan Chen
    Jinlong Wang
    Bangwei Yin
    Kunliang Yu
    Jinguang Han
    [J]. China Communications, 2023, 20 (05) : 198 - 216
  • [7] PUF-Based Authentication Protocols - Revisited
    Busch, Heike
    Katzenbeisser, Stefan
    Baecher, Paul
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
  • [8] Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study
    Modarres, Amir Masoud Aminian
    Sarbishaei, Ghazaleh
    [J]. IEEE Networking Letters, 2023, 5 (04): : 304 - 308
  • [9] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    [J]. SENSORS, 2023, 23 (14)
  • [10] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    [J]. 11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794