Robust and Efficient Authentication and Group-Proof Scheme Using Physical Unclonable Functions for Wearable Computing

被引:3
作者
Yu, Sungjin [1 ,2 ]
Park, Youngho [2 ]
机构
[1] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[2] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
关键词
physical unclonable function (PUF); privacy-preserving; authentication; group proof; wearable computing; PROVABLY SECURE; PROTOCOL; INTERNET; DEVICES;
D O I
10.3390/s23125747
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from sensor data. However, wearable computing environments can be fragile to cyber security attacks since adversaries attempt to block, delete, or intercept the exchanged information via insecure communication channels. In addition to cyber security attacks, wearable sensor devices cannot resist physical threats since they are batched in unattended circumstances. Furthermore, existing schemes are not suited for resource-constrained wearable sensor devices with regard to communication and computational costs and are inefficient regarding the verification of multiple sensor devices simultaneously. Thus, we designed an efficient and robust authentication and group-proof scheme using physical unclonable functions (PUFs) for wearable computing, denoted as AGPS-PUFs, to provide high-security and cost-effective efficiency compared to the previous schemes. We evaluated the security of the AGPS-PUF using a formal security analysis, including the ROR Oracle model and AVISPA. We carried out the testbed experiments using MIRACL on Raspberry PI4 and then presented a comparative analysis of the performance between the AGPS-PUF scheme and the previous schemes. Consequently, the AGPS-PUF offers superior security and efficiency than existing schemes and can be applied to practical wearable computing environments.
引用
收藏
页数:26
相关论文
共 42 条
  • [1] A secure remote user authentication scheme for 6LoWPAN-based Internet of Things
    Abbas, Ghulam
    Tanveer, Muhammad
    Abbas, Ziaul Haq
    Waqas, Muhammad
    Baker, Thar
    Obe, Dhiya Al-Jumeily
    [J]. PLOS ONE, 2021, 16 (11):
  • [2] Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
  • [3] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [4] An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring
    Ali R.
    Pal A.K.
    Kumari S.
    Sangaiah A.K.
    Li X.
    Wu F.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 1165 - 1186
  • [5] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [6] [Anonymous], 2010, P IEEE INFOCOM SAN D
  • [7] AVISPA, 2001, AUT VAL INT SEC PROT
  • [8] LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart
    Badshah, Akhtar
    Waqas, Muhammad
    Abbas, Ghulam
    Muhammad, Fazal
    Abbas, Ziaul Haq
    Vimal, S.
    Bilal, Muhammad
    [J]. SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2022, 52
  • [9] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
  • [10] Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) : 1310 - 1322