Provably secure biometric and PUF-based authentication for roaming service in global mobility network

被引:0
作者
Nurkifli, E. Haodudin [1 ]
机构
[1] Univ Singaperbangsa Karawang, Fac Comp Sci, Karawang, West Java, Indonesia
关键词
GLOMONET; Internet of Thing; Programming Model Analysis; Mathematical Model Analysis; KEY AGREEMENT SCHEME; USER AUTHENTICATION; PROTOCOL; ANONYMITY;
D O I
10.1016/j.aej.2024.11.036
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The Global Mobility Network (GLOMONET) is crucial in the context of the Internet of Things (IoT) as it enables users to connect to the Internet from anywhere, anytime. However, while GLOMONET offers numerous benefits, it also present security challenges that need to be addressed. To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. Therefore, this article proposes a new authentication protocol for GLOMONET that addresses these security issues. A formal analysis using Mao and Boyd's logic showed that the proposed protocol provides secure mutual authentication properties, and the RoR model demonstrated its resistance to attacks. In addition, the Programming Model Analysis (Scyther tool) confirmed that the proposed protocol meets security features and can withstand known attacks. The time complexity demonstration shows that the proposed protocol has a total complexity time of 5.482 seconds, the lowest time in the comparison subsection, indicating its suitability for use in GLOMONET.
引用
收藏
页码:414 / 430
页数:17
相关论文
共 57 条
[1]   A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles [J].
Aman, Muhammad Naveed ;
Javaid, Uzair ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) :1123-1139
[2]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[3]  
[Anonymous], Java Cryptography Architecture Oracle Providers Documentation for Java Platform Standard Edition 7
[4]   A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes [J].
Arjona, Rosario ;
Angel Prada-Delgado, Miguel ;
Arcenegui, Javier ;
Baturone, Iluminada .
SENSORS, 2018, 18 (08)
[5]   A secure authentication and key agreement scheme for roaming service with user anonymity [J].
Arshad, Hamed ;
Rasoolzadegan, Abbas .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
[6]   Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme [J].
Bian, Weixin ;
Gope, Prosanta ;
Cheng, Yongqiang ;
Li, Qingde .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :45-55
[7]  
Bohm C., 2012, Physical Unclonable Functions in Theory and Practice
[8]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[9]   A Physically Unclonable Function Using Soft Oxide Breakdown Featuring 0% Native BER and 51.8 fJ/bit in 40-nm CMOS [J].
Chuang, Kai-Hsin ;
Bury, Erik ;
Degraeve, Robin ;
Kaczer, Ben ;
Linten, Dimitri ;
Verbauwhede, Ingrid .
IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2019, 54 (10) :2765-2776
[10]  
Cremers C., 2014, Scyther User Manual