PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks

被引:2
|
作者
Xie, Qi [1 ]
Yao, Ye [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 13期
基金
中国国家自然科学基金;
关键词
underwater acoustic networks; authentication; protocol; chaotic maps; PUF; MUTUAL AUTHENTICATION; SCHEME; SECURITY;
D O I
10.3390/app14135400
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A secure and effective authentication and communication scheme between users and underwater sensors plays an important role in improving the detection and utilization of marine resources in underwater acoustic networks (UANs). However, due to the energy limitations and susceptibility to capture of underwater sensors and gateways, it is necessary to design a lightweight authentication protocol that can resist capture of sensors and gateways during attacks. In this paper, a lightweight authentication protocol for UANs based on the Physical Unclonable Function (PUF) and chaotic map is proposed. We used the advantages of PUF to resist sensors and gateways being captured in attacks and the chaotic map to achieve lightweight authentication because the computational cost of the chaotic map is almost one-third that of Elliptic Curve Cryptography (ECC). Additionally, we used the formal security proof in the random oracle model to prove the security of the proposed scheme. Our scheme was more secure and efficient compared with some other related schemes in terms of security and performance requirements, and the proposed scheme is suitable for UANs.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Hao, Xinhong
    Wang, Jiantao
    Yang, Qinghai
    Yan, Xiaopeng
    Li, Ping
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
  • [32] Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments
    Pang, Fengling
    Hsu, Chingfang
    Au, Man Ho
    Harn, Lein
    Zhang, Ze
    Long, Li
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 849 - 856
  • [33] A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services
    Dharminder, Dharminder
    Kumar, Uddeshaya
    Gupta, Pratik
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2531 - 2542
  • [34] A PUF-based anonymous authentication protocol for wireless medical sensor networks
    Xiaowei Shao
    Yajun Guo
    Yimin Guo
    Wireless Networks, 2022, 28 : 3753 - 3770
  • [35] An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
    Yu, Yicheng
    Taylor, Oliver
    Li, Rui
    Sunagawa, Baiho
    MATHEMATICS, 2021, 9 (08)
  • [36] Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Nonlinear Dynamics, 2015, 79 : 809 - 821
  • [37] Improved Secure and Efficient Chebyshev Chaotic Map-Based User Authentication Scheme
    Ryu, Jihyeon
    Kang, Dongwoo
    Won, Dongho
    IEEE ACCESS, 2022, 10 : 15891 - 15910
  • [38] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8547 - 8559
  • [39] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [40] Lightweight PUF-based Continuous Authentication Protocol
    Goutsos, Konstantinos
    Bystrov, Alex
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 229 - 234