PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications

被引:28
|
作者
Zheng, Yue [1 ]
Liu, Wenye [1 ]
Gu, Chongyan [2 ]
Chang, Chip-Hong [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[2] Queens Univ, Inst Elect Commun & Informat Technol ECIT, Ctr Secure Informat Technol CSIT, Belfast BT3 9DT, Qub, North Ireland
基金
英国工程与自然科学研究理事会;
关键词
Peer-to-peer Internet of Things; IoT security; physical unclonable functions; peer-entity authentication protocol; authenticated key exchange protocol; man-in-the-middle attacks; DEVICE HASH; SECURITY;
D O I
10.1109/TDSC.2022.3193570
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its lower latency and higher privacy compared to database-driven or server-based IoT. However, wireless vulnerabilities raise severe concerns on IoT device-to-device communication. This is further aggravated by the challenge to achieve lightweight direct mutual authentication and secure key exchange between IoT peer nodes in P2P IoT applications. Physical unclonable function (PUF) is a key enabler to lightweight, low-power and secure authentication of resource-constrained devices in IoT. Nevertheless, current PUF-enabled authentication protocols, with or without the challenge-response pairs (CRPs) of each of its interlocutors stored in the verifier's side, are incompatible for P2P IoT scenarios due to the security, storage and computing power limitations of IoT devices. To solve this problem, a new lightweight PUF-based mutual authentication and key exchange protocol is proposed. It allows two resource-constrained PUF embedded endpoint devices to authenticate each other directly without the need for local storage of CRPs or any private secrets, and simultaneously establish the session key for secure data exchange without resorting to the public-key algorithm. The proposed protocol is evaluated using the game-based formal security analysis method as well as the automatic security analysis tool ProVerif to corroborate its mutual authenticity, secrecy, and resistance against replay and man-in-the-middle (MITM) attacks. Using two Avnet Ultra96-V2 boards to emulate the two IoT endpoint devices, a physical prototype system is also constructed to demonstrate and validate the feasibility of the proposed secure P2P connection scheme. A comparative analysis shows that the proposed protocol outperforms related protocols in terms of security features, computational complexity as well as communication and storage costs.
引用
收藏
页码:3299 / 3316
页数:18
相关论文
共 50 条
  • [1] PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT
    Roy, Sourav
    Das, Dipnarayan
    Mondal, Anindan
    Mahalat, Mahabub Hasan
    Sen, Bibhash
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8547 - 8559
  • [2] A PUF-based Mutual Authentication Protocol for Internet of Things
    Satamraju, Krishna Prasad
    Malarkodi, B.
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [3] A PUF-based hardware mutual authentication protocol
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzocca, Nicola
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 119 : 107 - 120
  • [4] PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices
    Raj, Kamal
    Bodapati, Srinivasu
    Chattopadhyay, Anupam
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [5] T2S-MAKEP and T2T-MAKEP: A PUF-based Mutual Authentication and Key Exchange Protocol for IoT devices
    Zerrouki, Fahem
    Ouchani, Samir
    Bouarfa, Hafida
    INTERNET OF THINGS, 2023, 24
  • [6] A peer mutual authentication method on super peer based peer-to-peer network
    Oh, Byeong-Thaek
    Lee, Sang-Bong
    Park, Ho-Jin
    2008 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2008, : 121 - 124
  • [7] Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform
    Liu, Dongdong
    Ji, Tiantian
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [8] The Improvement of PUF-Based Authentication in IoT Systems
    Nurkifli, E. Haodudin
    Hwang, Tzonelih
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 918 - 927
  • [9] LPA: A Lightweight PUF-based Authentication Protocol for IoT System
    Rai, Vikash Kumar
    Tripathy, Somanath
    Mathew, Jimson
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1712 - 1717
  • [10] T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT
    Lounis, Karim
    Zulkernine, Mohammad
    IEEE ACCESS, 2021, 9 : 137384 - 137405