T2S-MAKEP and T2T-MAKEP: A PUF-based Mutual Authentication and Key Exchange Protocol for IoT devices

被引:2
作者
Zerrouki, Fahem [1 ]
Ouchani, Samir [2 ]
Bouarfa, Hafida [1 ]
机构
[1] Univ Blida 1, Fac Sci, Lab LRDSI, BP 270,Route Soumaa, Blida, Algeria
[2] CESI Lineact, Aix En Provence, France
关键词
IoT security; PUF-based authentication; Thing-to-Thing authentication; Key Exchange Protocol; Fuzzy extractor; LIGHTWEIGHT; SECURITY;
D O I
10.1016/j.iot.2023.100953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, more constrained devices are becoming connected, building an extensive Internet of Things (IoT) network, but suffering from many security issues. In particular, authentication has become a severe research challenge for IoT systems. Furthermore, confidentiality, integrity, and availability are considered the core underpinnings of information security in general. Unfortunately, deploying conventional authentication protocols for IoT devices in practice is challenging for two main reasons. First, IoT devices have limited memory capacity, processing power, and energy resources. Second, these protocols store secret keys in the IoT devices' volatile memory, making them vulnerable to physical attacks. Luckily, Physical Unclonable Functions (PUF) has emerged as promising low-cost security primitive. A PUF eliminates the need to store secret keys in device memory, making it a potential alternative to deploying more secure and low-cost authentication protocol schemes for IoT systems. Thing-to-Thing (T2T) or direct connection between IoT devices represents a promising technique to enable things to communicate directly without the need for a trusted third party. This paper proposes two novel lightweight Mutual Authentication and Key Exchange Protocols (MAKEP) for IoT devices using PUF. The first scheme, called T2S-MAKEP, ensures secure communication for Thing-toServer (T2S). The second, called T2T-MAKEP, allows two endpoints of resource-constrained IoT devices, each with an embedded PUF circuit, to communicate securely. Both proposed protocols, T2T-MAKEP and T2S-MAKEP, allow for robust authentication without storing any information on the device's memory and simultaneously establish the session key exchange. Our proposed protocols have been verified and validated using the automatic security analysis checker, Verifpal.
引用
收藏
页数:17
相关论文
共 32 条
[11]   A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices [J].
Idriss, Tarek A. ;
Idriss, Haytham A. ;
Bayoumi, Magdy A. .
IEEE ACCESS, 2021, 9 :80546-80558
[12]   PUF-enhanced offline RFID security and privacy [J].
Kardas, Suleyman ;
Celik, Serkan ;
Yildiz, Muhammet ;
Levi, Albert .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) :2059-2067
[13]  
Katagi M., 2011, IETF RFC 6114
[14]  
Kaveh M., 2020, 2020 20 IEEE INT C, P1, DOI DOI 10.1109/eeeic/icpseurope49358.2020.9160596
[15]   PUF based IoT Device Authentication Scheme [J].
Kim, Byoungkoo ;
Yoon, Seoungyong ;
Kang, Yousung ;
Choi, Dooho .
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, :1460-1462
[16]  
Kobeissi N, 2020, LECT NOTES COMPUT SC, V12578, P151, DOI [10.1145/3411495.3421365, 10.1007/978-3-030-65277-7_8]
[17]   A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT [J].
Li, Sensen ;
Zhang, Tikui ;
Yu, Bin ;
He, Kuan .
IEEE SENSORS JOURNAL, 2021, 21 (04) :5487-5501
[18]   Extracting secret keys from integrated circuits [J].
Lim, D ;
Lee, JW ;
Gassend, B ;
Suh, GE ;
van Dijk, M ;
Devadas, S .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2005, 13 (10) :1200-1205
[19]  
Maes R., 2013, Physically Unclonable Functions: Concept and Constructions, DOI DOI 10.1007/978-3-642-41395-7
[20]  
Meng J., 2021, Lightweight and anonymous mutual authentication protocol for IoT devices with physical unclonable functions