A Lightweight Key Sharing Protocol for IoT Devices Based on PUF

被引:0
作者
Wang Z. [1 ]
Li S. [1 ]
Guo Y. [1 ]
Zeng J. [2 ]
机构
[1] College of Computer Science and Technology, National University of Defense Technology, Changsha
[2] School of Physics and Microelectronics Science, Hunan University, Changsha
来源
Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences | 2022年 / 49卷 / 10期
基金
中国国家自然科学基金;
关键词
authentication protocol; internet of things; key sharing; lightweight; physical unclonable function;
D O I
10.16339/j.cnki.hdxbzkb.2022352
中图分类号
学科分类号
摘要
The Internet of Things(IoT)carries the safe transmission and storage of a large amount of sensitive information. Since IoT devices are resource-constrained, which have expensive communication, slow mission velocity and need to store sensitive information security primitives(such as public key algorithm and digital signature),they are not suitable for the authentication of lightweight IoT devices. This paper proposes a lightweight anonymous key sharing security authentication protocol for IoT devices, which generates a shared key by the Physical Unclonable Function(PUF)and uses security primitives such as the MASK algorithm and the Hash function. The security analysis and verification are accomplished by Ban logic and ProVerif to prove that the protocol ensures security attributes such as anonymity, non-repudiation, and forward/backward confidentiality. Compared with other protocols, this protocol has the characteristics of low computing cost, small communication overhead and storage capacity, and high security performance, which is suitable for the secure communication transmission of resource-constrained devices. © 2022 Hunan University. All rights reserved.
引用
收藏
页码:103 / 110
页数:7
相关论文
共 17 条
[1]  
SAXENA V, A survey on IoT security:application areas,security threats,and solution architectures[J].IEEE Access, 7, pp. 82721-82743, (2019)
[2]  
NOOR S, HASAN R., HSC-IoT:a hardware and software co-verification based authentication scheme for Internet of Things, 2017 5th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering(Mobile Cloud), pp. 109-116, (2017)
[3]  
ZHOU L, YEH K H, Lightweight IoT-based authentication scheme in cloud computing circumstance[J], Future Generation Computer Systems, 91, pp. 244-251, (2019)
[4]  
WANG X, JIA Q X,, GAO X, Provable security lightweight service-less RFID security search protocol[J], Journal of Hunan University(Natural Sciences), 41, 8, pp. 117-124, (2014)
[5]  
CHENG Y Q, Bio-AKA:an efficient fingerprint based two factor user authentication and key agreement scheme[J], Future Generation Computer Systems, 109, pp. 45-55, (2020)
[6]  
HU J, Design of miniature image acquisition system based on low power system on chip[J], Journal of Hunan University(Natural Sciences), 46, 2, pp. 86-91, (2019)
[7]  
Remanence decay side-channel:the PUF case[J], IEEE Transactions on Information Forensics and Security, 11, 6, pp. 1106-1116, (2016)
[8]  
CHANG C H,, ZHENG Y, ZHANG L., A retrospective and a look forward:fifteen years of physical unclonable function advancement [J], IEEE Circuits and Systems Magazine, 17, 3, pp. 32-62, (2017)
[9]  
A lockdown technique to prevent machine learning on PUFs for lightweight authentication [J], IEEE Transactions on Multi-Scale Computing Systems, 2, 3, pp. 146-159, (2016)
[10]  
HUANG Z, WANG Q., A PUF-based unified identity verification framework for secure IoT hardware via device authentication[J].World Wide Web, 23, 2, pp. 1057-1088, (2020)