Physical-Unclonable-Function-Based Secure and Anonymous User Authentication for Smart Homes

被引:1
作者
Lee, Hakjun [1 ]
Ryu, Jihyeon [2 ]
机构
[1] Kyungnam Univ, Dept Comp Engn, Changwon Si 51767, Gyeongsangnam D, South Korea
[2] Kwangwoon Univ, Sch Comp & Informat Engn, Seoul 01897, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
基金
新加坡国家研究基金会;
关键词
Authentication; Security; Smart homes; Physical unclonable function; Logic gates; Biometrics; Temperature measurement; Performance evaluation; Temperature sensors; Registers; Multi-factor authentication; authentication protocols; smart home; physical unclonable function; SCHEME; EFFICIENT;
D O I
10.1109/ACCESS.2024.3502250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) technology has revolutionized various sectors, including healthcare, smart cities, agriculture, education, and homes. The interconnected network of diverse IoT devices used in smart homes allows users to remotely manage lighting, security systems, heating, and household appliances through smart devices. The multitude of interactions and frequent data exchanges in smart homes necessitate robust user authentication. Strengthening smart home security is crucial to ensuring user safety and safeguarding personal information, thereby maximizing the benefits of smart technology. In 2023, Bai et al. proposed an authentication scheme aimed at ensuring anonymity and secure key establishment in smart environments. Although their scheme achieved various security objectives, we identified security vulnerabilities in their proposal. In this paper, we highlight the weaknesses in their scheme and introduce a new, secure, and anonymous authentication scheme. The proposed solution integrates bio-hash techniques for protecting user identity and physical unclonable functions to mitigate device capture attacks. Our scheme establishes a secure session key between the user, gateway, and sensor, providing protection against various known attacks from both internal and external adversaries. Furthermore, we conducted both formal and informal analyses to validate the security of the proposed scheme and compared its performance with related schemes to demonstrate its effectiveness and practical applicability.
引用
收藏
页码:172483 / 172498
页数:16
相关论文
共 46 条
[1]   Using the internet of things in smart energy systems and networks [J].
Ahmad, Tanveer ;
Zhang, Dongdong .
SUSTAINABLE CITIES AND SOCIETY, 2021, 68
[2]   LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment [J].
Alsahlani, Ahmed Yaser Fahad ;
Popa, Alexandru .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 192
[3]   Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks [J].
Anthi, Eirini ;
Williams, Lowri ;
Laved, Amir ;
Burnap, Pete .
COMPUTERS & SECURITY, 2021, 108
[4]   A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments [J].
Bai, Linyan ;
Hsu, Chingfang ;
Harn, Lein ;
Cui, Jianqun ;
Zhao, Zhuo .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) :3535-3545
[5]  
Banafa A., 2018, Secure and smart internet of things (IoT): Using blockchain and AI
[6]  
Blanchet B., 2018, Proverif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial, V16, P5
[7]   Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data [J].
Braeken, An .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23) :21089-21099
[8]   A LOGIC OF AUTHENTICATION [J].
BURROWS, M ;
ABADI, M ;
NEEDHAM, RM .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1989, 426 (1871) :233-271
[9]   Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration [J].
Chaudhary, Ajay ;
Peddoju, Sateesh K. ;
Chouhan, Vikas .
JOURNAL OF GRID COMPUTING, 2023, 21 (03)
[10]   An efficient mutual authentication and key agreement scheme without password for wireless sensor networks [J].
Chen, Yulei ;
Chen, Jianhua .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (12) :13653-13675