T2S-MAKEP and T2T-MAKEP: A PUF-based Mutual Authentication and Key Exchange Protocol for IoT devices

被引:2
作者
Zerrouki, Fahem [1 ]
Ouchani, Samir [2 ]
Bouarfa, Hafida [1 ]
机构
[1] Univ Blida 1, Fac Sci, Lab LRDSI, BP 270,Route Soumaa, Blida, Algeria
[2] CESI Lineact, Aix En Provence, France
关键词
IoT security; PUF-based authentication; Thing-to-Thing authentication; Key Exchange Protocol; Fuzzy extractor; LIGHTWEIGHT; SECURITY;
D O I
10.1016/j.iot.2023.100953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, more constrained devices are becoming connected, building an extensive Internet of Things (IoT) network, but suffering from many security issues. In particular, authentication has become a severe research challenge for IoT systems. Furthermore, confidentiality, integrity, and availability are considered the core underpinnings of information security in general. Unfortunately, deploying conventional authentication protocols for IoT devices in practice is challenging for two main reasons. First, IoT devices have limited memory capacity, processing power, and energy resources. Second, these protocols store secret keys in the IoT devices' volatile memory, making them vulnerable to physical attacks. Luckily, Physical Unclonable Functions (PUF) has emerged as promising low-cost security primitive. A PUF eliminates the need to store secret keys in device memory, making it a potential alternative to deploying more secure and low-cost authentication protocol schemes for IoT systems. Thing-to-Thing (T2T) or direct connection between IoT devices represents a promising technique to enable things to communicate directly without the need for a trusted third party. This paper proposes two novel lightweight Mutual Authentication and Key Exchange Protocols (MAKEP) for IoT devices using PUF. The first scheme, called T2S-MAKEP, ensures secure communication for Thing-toServer (T2S). The second, called T2T-MAKEP, allows two endpoints of resource-constrained IoT devices, each with an embedded PUF circuit, to communicate securely. Both proposed protocols, T2T-MAKEP and T2S-MAKEP, allow for robust authentication without storing any information on the device's memory and simultaneously establish the session key exchange. Our proposed protocols have been verified and validated using the automatic security analysis checker, Verifpal.
引用
收藏
页数:17
相关论文
共 32 条
  • [1] Aman M.N., 2020, P INT C FORTHCOMING, VVolume 353, P82
  • [2] Mutual Authentication in IoT Systems Using Physical Unclonable Functions
    Aman, Muhammad Naveed
    Chua, Kee Chaing
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1327 - 1340
  • [3] End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions
    Byun, Jin Wook
    [J]. IEEE ACCESS, 2019, 7 : 102951 - 102965
  • [4] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [5] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [6] Emerging Physical Unclonable Functions With Nanotechnology
    Gao, Yansong
    Ranasinghe, Damith C.
    Al-Sarawi, Said F.
    Kavehei, Omid
    Abbott, Derek
    [J]. IEEE ACCESS, 2016, 4 : 61 - 80
  • [7] Controlled Physical Random Functions
    Gassend, B
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 149 - 160
  • [8] Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
    Gope, Prosanta
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 580 - 589
  • [9] Guan Zhenyu, 2019, [Journal of Communications and Information Networks, 通信与信息网络学报], V4, P44
  • [10] Halak B., 2018, Physically Unclonable Functions