Robust and Efficient Authentication and Group-Proof Scheme Using Physical Unclonable Functions for Wearable Computing

被引:3
作者
Yu, Sungjin [1 ,2 ]
Park, Youngho [2 ]
机构
[1] Elect & Telecommun Res Inst, Daejeon 34129, South Korea
[2] Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea
关键词
physical unclonable function (PUF); privacy-preserving; authentication; group proof; wearable computing; PROVABLY SECURE; PROTOCOL; INTERNET; DEVICES;
D O I
10.3390/s23125747
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from sensor data. However, wearable computing environments can be fragile to cyber security attacks since adversaries attempt to block, delete, or intercept the exchanged information via insecure communication channels. In addition to cyber security attacks, wearable sensor devices cannot resist physical threats since they are batched in unattended circumstances. Furthermore, existing schemes are not suited for resource-constrained wearable sensor devices with regard to communication and computational costs and are inefficient regarding the verification of multiple sensor devices simultaneously. Thus, we designed an efficient and robust authentication and group-proof scheme using physical unclonable functions (PUFs) for wearable computing, denoted as AGPS-PUFs, to provide high-security and cost-effective efficiency compared to the previous schemes. We evaluated the security of the AGPS-PUF using a formal security analysis, including the ROR Oracle model and AVISPA. We carried out the testbed experiments using MIRACL on Raspberry PI4 and then presented a comparative analysis of the performance between the AGPS-PUF scheme and the previous schemes. Consequently, the AGPS-PUF offers superior security and efficiency than existing schemes and can be applied to practical wearable computing environments.
引用
收藏
页数:26
相关论文
共 42 条
  • [31] IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks
    Tan, Chiu C.
    Wang, Haodong
    Zhong, Sheng
    Li, Qun
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2009, 13 (06): : 926 - 932
  • [32] LACP-SG: Lightweight Authentication Protocol for Smart Grids
    Tanveer, Muhammad
    Alasmary, Hisham
    [J]. SENSORS, 2023, 23 (04)
  • [33] Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users
    Vhaduri, Sudip
    Poellabauer, Christian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3116 - 3125
  • [34] von Oheimb David., 2005, P APPSEM 2005 WORKSH
  • [35] Zipf's Law in Passwords
    Wang, Ding
    Cheng, Haibo
    Wang, Ping
    Huang, Xinyi
    Jian, Gaopeng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2776 - 2791
  • [36] Wang SL, 2016, IEEE NETWORK, V30, P61, DOI 10.1109/MNET.2016.7579028
  • [37] An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    [J]. MULTIMEDIA SYSTEMS, 2017, 23 (02) : 195 - 205
  • [38] Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks
    Xiong, Hu
    Qin, Zhiguang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1442 - 1455
  • [39] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
    Yu, SungJin
    Park, KiSung
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 131
  • [40] A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions
    Yu, Sungjin
    Park, Youngho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) : 20214 - 20228