A Lightweight PUF-Based Protocol for Dynamic and Secure Group Key Management in IoT

被引:0
作者
Barbareschi, Mario [1 ]
Casola, Valentina [1 ]
Emmanuele, Antonio [1 ]
Lombardi, Daniele [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Internet of Things; Protocols; Physical unclonable function; Authentication; Performance evaluation; Synchronization; Proposals; Constrained devices; group key management; Internet of Things (IoT); physically unclonable function (PUF); AUTHENTICATION; SCHEME; INTERNET;
D O I
10.1109/JIOT.2024.3418207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many Internet of Things (IoT) applications, resource-constrained devices often collaborate in groups for the acquisition, transmission, and management of sensitive information. To uphold the security of these operations, symmetric encryption algorithms are commonly employed due to their efficiency and speed. Nevertheless, establishing a key management mechanism, that accommodates the distinctive features of the IoT domain, remains an ongoing challenge. This article introduces Group-Key PHEMAP, a novel physically unclonable function (PUF)-based protocol for group key management in IoT applications. The proposed protocol relies solely on lightweight operations for group key management and supports dynamic membership without leveraging additional cryptographic keys. We present a formal demonstration for security properties and a comprehensive analysis, regarding both computational and communication costs, as well as scalability property concerning the growing number of devices within the group. Finally, we validate the suitability of our proposal by resorting to the ns-3 network simulator, and, by implementing the protocol on devices representing typical characteristics of those used in IoT applications.
引用
收藏
页码:32969 / 32984
页数:16
相关论文
共 40 条
[1]  
Abdmeziem Mohammed Riyadh, 2015, 2015 IEEE International Conferences on Computer and Information Technology
[2]  
Ubiquitous Computing and Communications
[3]  
Dependable, Autonomic and Secure Computing
[4]   A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK) [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel ;
Romdhani, Imed .
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, :1110-1118
[5]  
Abualghanam O., 2019, J. Theor. Appl. Inf. Technol, V97, P3217
[6]  
[Anonymous], 2023, Mirai-Based RapperBot Worm Targets IoT Devices Via 'Intelligent Brute Forcing'
[7]  
Barbareschi M., 2017, Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, P189, DOI [10.1007/978-3-319-44318-8_10, DOI 10.1007/978-3-319-44318-8_10]
[8]   A PUF-based mutual authentication scheme for Cloud-Edges IoT systems [J].
Barbareschi, Mario ;
De Benedictis, Alessandra ;
La Montagna, Erasmo ;
Mazzeo, Antonino ;
Mazzocca, Nicola .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :246-261
[9]   A PUF-based hardware mutual authentication protocol [J].
Barbareschi, Mario ;
De Benedictis, Alessandra ;
Mazzocca, Nicola .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 :107-120
[10]  
Bhargava M, 2014, DES AUT TEST EUROPE