Physical unclonable functions and QKD-based authentication scheme for IoT devices using blockchain

被引:1
作者
Cunha, Tyson Baptist D. [1 ]
Kiran, M. [1 ]
Ranjan, Ritik [2 ]
Vasilakos, Athanasios V. [3 ]
机构
[1] NITK, Mangalore 575025, Karnataka, India
[2] Srinivas Inst Technol, Mangalore 574143, Karnataka, India
[3] Univ Agder UiA, Ctr AI Res CAIR, Grimstad, Norway
关键词
PUF; QKD; Authentication; ROR model; Blockchain; Scyther; DATA-SECURITY; QUANTUM; PROTOCOL; FRAMEWORK; INTERNET;
D O I
10.1016/j.iot.2024.101404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of Internet of Things (IoT) devices is increasing exponentially, strong security measures are needed to guard against different types of cyberattacks. This research offers a novel IoT device authentication technique to mitigate these challenges by integrating three cutting-edge technologies namely blockchain technology, Quantum Key Distribution (QKD), and Physically Unclonable Functions (PUFs). By utilizing the distinctive qualities of PUFs for device identification and the unrivaled security of QKD for key exchange, the proposed approach seeks to address the significant security issues present in IoT environments. Adopting blockchain technology ensures transparency and verifiability of the authentication process across distributed IoT networks by adding an unchangeable, decentralized layer of trust. An examination of the computing and communication costs reveals that the proposed protocol is effective, necessitating low computational resources that are critical for IoT devices with limited resources. The protocol's resistance against a variety of attacks is demonstrated by formal proofs based on the Real-Or-Random (ROR) model and security evaluations using the Scyther tool, ensuring the integrity and secrecy of communications. Various threats are analyzed, and the protocol is proven to be secure and efficient from all forms of attacks.
引用
收藏
页数:18
相关论文
共 51 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   A Post-Quantum Compliant Authentication Scheme for IoT Healthcare Systems [J].
Adeli, Morteza ;
Bagheri, Nasour ;
Maimani, Hamid Reza ;
Kumari, Saru ;
Rodrigues, Joel J. P. C. .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04) :6111-6118
[3]  
Almutairi N, 2019, International Journal of Medicine in Developing Countries, P1, DOI [10.24911/ijmdc.51-1545856321, DOI 10.1109/cais.2019.8769532]
[4]  
[Anonymous], 2018, CPSCom) and IEEE Smart Data (SmartData), P1042
[5]   BlockHealth: Blockchain-based secure and peer-to-peer health information sharing with data protection and right to be forgotten [J].
Balistri, Eugenio ;
Casellato, Francesco ;
Giannelli, Carlo ;
Stefanelli, Cesare .
ICT EXPRESS, 2021, 7 (03) :308-315
[6]  
Bathalapalli Venkata K V V, 2022, SN Comput Sci, V3, P344, DOI [10.1007/s42979-022-01238-2, 10.1007/s42979-022-01238-2]
[7]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[8]   Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System [J].
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5744-5761
[9]   Post-quantum cryptography [J].
Bernstein, Daniel J. ;
Lange, Tanja .
NATURE, 2017, 549 (7671) :188-194
[10]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337