PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey

被引:69
|
作者
Mall, Priyanka [1 ]
Amin, Ruhul [2 ]
Das, Ashok Kumar [3 ]
Leung, Mark T. [4 ]
Choo, Kim-Kwang Raymond [5 ]
机构
[1] IIIT Naya Raipur, Dept Elect & Commun Engn, Chattisgarh 892002, India
[2] IIIT Naya Raipur, Dept Comp Sci & Engn, Chattisgarh 892002, India
[3] Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[4] Univ Texas San Antonio, Dept Management Sci & Stat, San Antonio, TX 78249 USA
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2022年 / 9卷 / 11期
关键词
Protocols; Authentication; Wireless sensor networks; Smart grids; Internet of Things; Cryptography; Mathematical models; Authentication and key agreement (AKA); physically unclonable function (PUF); smart grid; wireless sensor networks (WSNs); WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; MUTUAL AUTHENTICATION; PROVABLY SECURE; EXCHANGE PROTOCOL; SCHEME; LIGHTWEIGHT; INTERNET; 5G; SYSTEMS;
D O I
10.1109/JIOT.2022.3142084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function, which maps inherent properties of the hardware devices to a unique bit stream of information. Authentication and key agreement (AKA) protocols are widely used in electronic commerce, electronic stock trading, and many secured business transaction platforms, because they allow the communicating devices to mutually authenticate each other while exchanging authenticated session key (or secret key) that can be used subsequently to establish a secured communication channel. Yet, these protocols are also vulnerable to a broad range of security outbreaks. In light of these notions and practical applications, this article is intended to: 1) provide an overview of AKA protocols, PUF plus the combined PUF-based AKA; 2) systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast growing areas of Internet of Things, wireless sensor networks, and smart grids based on a meticulous survey of the existing literature; 3) summarize the challenges to deployment and potential security risks of the underlying technologies and possible remedies or mitigation strategies; and 4) to conduct and report a comparative performance and security analysis with respect to the three focused areas.
引用
收藏
页码:8205 / 8228
页数:24
相关论文
共 50 条
  • [21] Designing secure PUF-based authentication protocols for constrained environments
    Lee, Sang-Woong
    Safkhani, Masoumeh
    Quynh Le
    Ahmed, Omed Hassan
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Bagheri, Nasour
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01):
  • [22] Designing secure PUF-based authentication protocols for constrained environments
    Sang-Woong Lee
    Masoumeh Safkhani
    Quynh Le
    Omed Hassan Ahmed
    Mehdi Hosseinzadeh
    Amir Masoud Rahmani
    Nasour Bagheri
    [J]. Scientific Reports, 13 (1)
  • [23] LPA: A Lightweight PUF-based Authentication Protocol for IoT System
    Rai, Vikash Kumar
    Tripathy, Somanath
    Mathew, Jimson
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1712 - 1717
  • [24] Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges
    Babu, Ponnuru Raveendra
    Kumar, Sathish A.P.
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    [J]. Computer Science Review, 2024, 54
  • [25] A New Secure Scan Design with PUF-based Key for Authentication
    Wang, Qidong
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    [J]. 2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [26] PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
    Zheng, Yue
    Liu, Wenye
    Gu, Chongyan
    Chang, Chip-Hong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3299 - 3316
  • [27] A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
    Klaoudatou, Eleni
    Konstantinou, Elisavet
    Kambourakis, Georgios
    Gritzalis, Stefanos
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (03): : 429 - 442
  • [28] PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
    Mehta, Prarthana J.
    Parne, Balu L.
    Patel, Sankita J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 8099 - 8117
  • [29] Joint Heterogeneous PUF-Based Security-Enhanced IoT Authentication
    Yoon, Seungwook
    Han, Seungnam
    Hwang, Euiseok
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 18082 - 18096
  • [30] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475