Toward Energy Variations for IoT Lightweight Authentication in Backscatter Communication

被引:0
作者
Duan, Jinghai [1 ]
Tao, Jun [1 ]
Chi, Dingwen [1 ]
Li, Xiaoqian [1 ]
Xu, Yifan [1 ]
机构
[1] Southeast Univ, Sch Cyber Sci Engn, Nanjing 210000, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 01期
关键词
Authentication; Protocols; Security; Receivers; Internet of Things; Physical unclonable function; Backscatter; Authentication protocol; backscatter; Internet of Things (IoT); lightweight; zero-power communication;
D O I
10.1109/JIOT.2024.3464100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-power communication, enabled by energy harvesting, backscattering, and low-power computing, is capable of fulfilling the requirements of emerging Internet of Things (IoT) communication scenarios that demand low cost, compact size, and minimal power consumption. Thus, it holds great potential as a transformative technology for the future of IoT. Trusted access and secure transmission remain essential in zero-power communication scenarios. Nevertheless, conventional complex security mechanisms become impractical due to limited power consumption and resources. This work presents a lightweight security protocol for authentication. Initially, a sliding window algorithm, utilizing the Hamming distance, is designed to generate the message digest. This algorithm leverages the remaining electric quantity of the transmitter as a secret parameter for authentication. Subsequently, a key distribution function based on the hash chain is employed to ensure the security of the session key. The protocol's security attributes regarding transmitted data and its ability to withstand common attacks are demonstrated through formal security analysis and the utilization of the ProVerif analysis tool. Extensive simulations validate the efficacy of the proposed security algorithms, which are well suited for lightweight IoT devices with severely constrained resources and outperform benchmark algorithms.
引用
收藏
页码:569 / 581
页数:13
相关论文
共 40 条
  • [1] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [2] Landscape of IoT security
    Aidoo, Andy
    Schiller, Eryk
    Fuhrer, Jara
    Stahl, Jonathan
    Ziorjen, Michael
    Stiller, Burkhard
    [J]. COMPUTER SCIENCE REVIEW, 2022, 44
  • [3] Physical Unclonable Functions (PUF) for IoT Devices
    Al-Meer, Abdulaziz
    Al-Kuwari, Saif
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [4] Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
    Alshahrani, Mohammed
    Traore, Issa
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 156 - 175
  • [5] [Anonymous], 2022, OPPO zero-power communication technology white paper
  • [6] EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions
    Babu, Ponnuru Raveendra
    Reddy, Alavalapati Goutham
    Palaniswamy, Basker
    Das, Ashok Kumar
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05): : 3791 - 3807
  • [7] Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme
    Bian, Weixin
    Gope, Prosanta
    Cheng, Yongqiang
    Li, Qingde
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 45 - 55
  • [8] LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments
    Chaudhry, Shehzad Ashraf
    Yahya, Khalid
    Garg, Sahil
    Kaddoum, Georges
    Hassan, Mohammad Mehedi
    Zikria, Yousaf Bin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1504 - 1511
  • [9] Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing
    Chen, Shuai
    Li, Bing
    Chen, Ziheng
    Zhang, Yan
    Wang, Caicai
    Tao, Cheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14408 - 14425
  • [10] A lightweight authentication and key exchange mechanism for IPv6 over low-power wireless personal area networks-based Internet of things
    Chom Thungon, Leki
    Ahmed, Nurzaman
    Chandra Sahana, Subhas
    Hussain, Md. Iftekhar
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)