FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices

被引:14
|
作者
Chen, Zigang [1 ,5 ]
Cheng, Zhiquan [2 ]
Luo, Wenjun [1 ]
Ao, Jin [2 ]
Liu, Yuhong [3 ]
Sheng, Kai [4 ,6 ]
Chen, Long [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Colloge Comp Sci & Technol, Chongqing 400065, Peoples R China
[3] Santa Clara Univ, Dept Comp Sci & Engn, Santa Clara, CA 95053 USA
[4] Xidian Univ, Acad Adv Interdisciplinary Res, Xian 710071, Shanxi, Peoples R China
[5] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[6] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Guangdong, Peoples R China
关键词
Internet of Things; Multi-factor authentication; PUF; Fuzzy extractor; Firmware security; CHALLENGES; INTERNET;
D O I
10.1016/j.iot.2023.100685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of 5G mobile communication technology and the continuous expansion of the scale of the Internet of Things (IoT) industry, the number of IoT devices has grown exponentially. IoT devices have uneven security guarantees due to different application scenarios, which brings great security threats to the devices themselves and the IoT system. Especially with the physical threats of the device and firmware tampering, attackers can even make your home's sweeping robot a spy by modifying the firmware. In view of these threats, this paper proposes a FSMFA: Firmware-Secure Multi-Factor Authentication protocol based on PUF (physical unclonable function) and device firmware integrity, which enhance the physical and software security of IoT devices while enhancing the security of IoT system. So as to realize mutual authentication and key negotiation between the device and the server. At the same time, in order to guarantee the safety of the whole life cycle of the device, we propose the challenge response pairs (CRP s) and firmware update scheme of the device. Finally, we use BAN logic and ProVerif to prove the security of authentication and update protocols. Compared with other similar protocols, the proposed protocol achieves better security and higher efficiency.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Lightweight multi-factor mutual authentication protocol for IoT devices
    Melki, Reem
    Noura, Hassan N.
    Chehab, Ali
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (06) : 679 - 694
  • [2] Lightweight multi-factor mutual authentication protocol for IoT devices
    Reem Melki
    Hassan N. Noura
    Ali Chehab
    International Journal of Information Security, 2020, 19 : 679 - 694
  • [3] A proposal of multi-factor authentication scheme for secure iot environment
    Department of Industrial and Information Systems Engineering, Soongsil University, No. 369, Sangdo-Ro, Dongjak-Gu, Seoul
    156-743, Korea, Republic of
    ICIC Express Lett Part B Appl., 12 (3231-3236):
  • [4] Secure and Lightweight Mutual Multi-Factor Authentication for IoT Communication Systems
    Noura, Hassan N.
    Melki, Reem
    Chehab, Ali
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [5] Smart Home Security: An Efficient Multi-Factor Authentication Protocol
    Sarbishaei, Ghazaleh
    Modarres, Amir Masoud Aminian
    Jowshan, Farahnaz
    Khakzad, Fateme Zahra
    Mokhtari, Hasti
    IEEE ACCESS, 2024, 12 : 106253 - 106272
  • [6] A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
    Ali, Guma
    Dida, Mussa Ally
    Elikana Sam, Anael
    FUTURE INTERNET, 2021, 13 (12):
  • [7] A secure and efficient three-factor authentication protocol for IoT environments
    Li, Yi
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 179
  • [8] Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
    Wang, Zhenyu
    Deng, Ding
    Hou, Shen
    Guo, Yang
    Li, Shaoqing
    COMPUTER COMMUNICATIONS, 2023, 203 : 1 - 14
  • [9] A Secure Multi-factor Remote User Authentication Scheme for Cloud-IoT Applications
    Lee, JoonYoung
    Kim, MyeongHyun
    Yu, SungJin
    Park, KiSung
    Park, YoungHo
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [10] Verifying a secure authentication protocol for IoT medical devices
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1985 - 1990