A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions

被引:2
作者
Fan, Chun-, I [1 ,2 ]
Karati, Arijit [3 ]
Wu, Shou-Li [3 ]
机构
[1] Natl Sun Yat Sen Univ, Informat Secur Res Ctr, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
[2] Natl Sun Yat Sen Univ, Intelligent Elect Commerce Res Ctr, Kaohsiung 804, Taiwan
[3] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804, Taiwan
关键词
Authentication; Smart cards; Security; Physical unclonable function; Passwords; Servers; Resistance; data privacy; physically unclonable functions; smart cards; security management; 2-FACTOR AUTHENTICATION; SCHEME; ROBUST;
D O I
10.1109/TDSC.2023.3317675
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
For many industrial applications, the smart card is a necessary safety component in user authentication. Smart cards provided to the users are used in open and public places, making them susceptible to physical and cloning attacks. Thus, the opponent can break the authentication process without the smart card if the information is exposed. In addition, many existing authentication systems employ challenge-response pairs (CRPs) to identify users by creating large numbers of data on the server and spending much time looking for and comparing responses. To address these concerns, we propose a lightweight privacy-preserving authentication protocol in which the physically unclonable function is considered a necessary tool. The suggested technique avoids creating a significant number of CRPs on the server to identify users uniquely. Under formal security models, the proposed protocol is resistant to user impersonation attacks and session key disclosure attacks and achieves robust mutual authentication. Nonetheless, it is immune to other essential security vulnerabilities. Empirical performance analysis demonstrates its viability in comparison to prior works.
引用
收藏
页码:2766 / 2778
页数:13
相关论文
共 37 条
[11]   Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions [J].
Gope, Prosanta ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (11) :2831-2843
[12]   Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS) [J].
Gupta, B. B. ;
Prajapati, Varun ;
Nedjah, Nadia ;
Vijayakumar, P. ;
Abd El-Latif, Ahmed A. ;
Chang, Xiaojun .
NEURAL COMPUTING & APPLICATIONS, 2023, 35 (07) :5055-5080
[13]   Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters [J].
Harishma, Boyapally ;
Mathew, Paulson ;
Patranabis, Sikhar ;
Chatterjee, Urbi ;
Agarwal, Umang ;
Maheshwari, Manu ;
Dey, Soumyajit ;
Mukhopadhyay, Debdeep .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) :663-680
[14]   Robust and efficient password-authenticated key agreement using smart cards [J].
Juang, Wen-Shenq ;
Chen, Sian-Teng ;
Liaw, Horng-Twu .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2008, 55 (06) :2551-2556
[15]   Federated Secure Data Sharing by Edge-Cloud Computing Model* [J].
Karati, Arijit ;
Das, Sajal K. .
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, :1362-1367
[16]   ESEAP: ECC based secure and efficient mutual authentication protocol using smart card [J].
Kumari, Adesh ;
Jangirala, Srinivas ;
Abbasi, M. Yahya ;
Kumar, Vinod ;
Alam, Mansaf .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
[17]   Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards [J].
Li, Xiangxue ;
Qiu, Weidong ;
Zheng, Dong ;
Chen, Kefei ;
Li, Jianhua .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (02) :793-800
[18]   Advanced formal authentication protocol using smart cards for network applicants [J].
Limbasiya, Trupil ;
Soni, Mukesh ;
Mishra, Sajal Kumar .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 :50-63
[19]   A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment [J].
Meshram, Chandrashekhar ;
Ibrahim, Rabha W. ;
Deng, Lunzhi ;
Shende, Shailendra W. ;
Meshram, Sarita Gajbhiye ;
Barve, Sharad Kumar .
SOFT COMPUTING, 2021, 25 (15) :10037-10051
[20]   PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol [J].
Qureshi, Mahmood Azhar ;
Munir, Arslan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) :2457-2475