A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

被引:0
作者
Wan, Tao [1 ]
Ge, Jingjing [1 ]
Liao, Weichuan [2 ]
Zhao, Haixia [1 ]
机构
[1] East China Jiaotong Univ, Sch Informat Engineer, Nanchang 330013, Jiangxi, Peoples R China
[2] East China Jiaotong Univ, Sch Sci, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Agriculture; IoT; Lightweight; PUF; Location; Continuous authentication; INTERNET; SCHEME; ROBUST;
D O I
10.1007/s11277-024-11301-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based agricultural applications are able to better monitor crops and make informed decisions about resource allocation. Ensuring data reliability is a significant challenge in agricultural IoT environments. The reliability of collected data is subject to situational characteristics of IoT devices, such as their location, which can be easily compromised by environmental and human factors. To address this issue, location-based device authentication has been proposed as a means of ensuring data reliability. Currently, Physical Unclonable Function (PUF) is also widely used in IoT authentication mechanisms. In this paper, we propose a lightweight two-factor continuous authentication protocol based on PUF and location. The proposed protocol leverages the properties of PUF to resist physical attacks, uses simple cryptographic operations such as XORs and hash functions to ensure security, and reduces resource consumption through continuous authentication. A formal security analysis of the proposed scheme is performed using Burrows-Abadi-Needham (BAN) logic analysis. The informal security analysis of the proposed scheme demonstrates that it is resistant to several known attacks. Additionally, we further evaluate the performance of the proposed scheme. The results demonstrate that the proposed scheme has low communication and computational costs, and offers better security and functionality attributes.
引用
收藏
页码:921 / 945
页数:25
相关论文
共 43 条
  • [1] Abhishek C.N., 2022, INVENTIVE COMMUNICAT, P811
  • [2] Almadhoun R, 2018, I C COMP SYST APPLIC
  • [3] Two-Factor Authentication for IoT With Location Information
    Aman, Muhammad Naveed
    Basheer, Mohamed Haroon
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3335 - 3351
  • [4] Mutual Authentication in IoT Systems Using Physical Unclonable Functions
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1327 - 1340
  • [5] Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes
    Ashibani, Yosef
    Kauling, Dylan
    Mahmoud, Qusay H.
    [J]. APPLIED SYSTEM INNOVATION, 2019, 2 (01) : 1 - 20
  • [6] A Robust Device-to-Device Continuous Authentication Protocol for the Internet of Things
    Badhib, Arwa
    Alshehri, Suhair
    Cherif, Asma
    [J]. IEEE ACCESS, 2021, 9 : 124768 - 124792
  • [7] User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej
    El Fray, Imed
    Kurkowski, Miroslaw
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    [J]. IEEE ACCESS, 2022, 10 : 16439 - 16455
  • [8] How to feed the world sustainably: an overview of the discourse on agroecology and sustainable intensification
    Bernard, Barbara
    Lux, Alexandra
    [J]. REGIONAL ENVIRONMENTAL CHANGE, 2017, 17 (05) : 1279 - 1290
  • [9] PUF Based Authentication Protocol for IoT
    Braeken, An
    [J]. SYMMETRY-BASEL, 2018, 10 (08):
  • [10] Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey
    Chen, Liang
    Thombre, Sarang
    Jarvinen, Kimmo
    Lohan, Elena Simona
    Alen-Savikko, Anette
    Leppakoski, Helena
    Bhuiyan, M. Zahidul H.
    Bu-Pasha, Shakila
    Ferrara, Giorgia Nunzia
    Honkala, Salomon
    Lindqvist, Jenna
    Ruotsalainen, Laura
    Korpisaari, Paivi
    Kuusniemi, Heidi
    [J]. IEEE ACCESS, 2017, 5 : 8956 - 8977