PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks

被引:2
|
作者
Xie, Qi [1 ]
Yao, Ye [1 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2024年 / 14卷 / 13期
基金
中国国家自然科学基金;
关键词
underwater acoustic networks; authentication; protocol; chaotic maps; PUF; MUTUAL AUTHENTICATION; SCHEME; SECURITY;
D O I
10.3390/app14135400
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A secure and effective authentication and communication scheme between users and underwater sensors plays an important role in improving the detection and utilization of marine resources in underwater acoustic networks (UANs). However, due to the energy limitations and susceptibility to capture of underwater sensors and gateways, it is necessary to design a lightweight authentication protocol that can resist capture of sensors and gateways during attacks. In this paper, a lightweight authentication protocol for UANs based on the Physical Unclonable Function (PUF) and chaotic map is proposed. We used the advantages of PUF to resist sensors and gateways being captured in attacks and the chaotic map to achieve lightweight authentication because the computational cost of the chaotic map is almost one-third that of Elliptic Curve Cryptography (ECC). Additionally, we used the formal security proof in the random oracle model to prove the security of the proposed scheme. Our scheme was more secure and efficient compared with some other related schemes in terms of security and performance requirements, and the proposed scheme is suitable for UANs.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP
    Mahor V.K.
    Padmavathy R.
    Chatterjee S.
    International Journal of Security and Networks, 2022, 17 (01) : 39 - 47
  • [42] Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
    Wang, Weizheng
    Chen, Qiu
    Yin, Zhimeng
    Srivastava, Gautam
    Gadekallu, Thippa Reddy
    Alsolami, Fawaz
    Su, Chunhua
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8883 - 8891
  • [43] On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Zhang, Xiaojie
    Wu, Tsu-Yang
    Pan, Jeng-Shyang
    2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 143 - 146
  • [44] An enhanced three-factor based authentication and key agreement protocol using PUF in IoMT
    Wu, Tsu-Yang
    Wu, Haozhi
    Kumari, Saru
    Chen, Chien-Ming
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [45] An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Obaidat, Mohammad S.
    Karthikeyan, Isswarya
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [46] Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations
    Hsieh, Yi-Pei
    Lee, Kuo-Chang
    Lee, Tian-Fu
    Su, Guo-Jun
    APPLIED SCIENCES-BASEL, 2022, 12 (11):
  • [47] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Journal of Medical Systems, 2013, 37
  • [48] Chaotic map-based three-party authenticated key agreement
    Lin, Han-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2469 - 2474
  • [49] CCAKESC: Chaotic map-based construction of a new authenticated key exchange protocol for satellite communication
    Kumar, Uddeshaya
    Garg, Manish
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2022, 40 (03) : 218 - 229
  • [50] A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services
    Dharminder Dharminder
    Uddeshaya Kumar
    Pratik Gupta
    Complex & Intelligent Systems, 2021, 7 : 2531 - 2542