PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication

被引:12
作者
Mahmood, Khalid [1 ]
Shamshad, Salman [1 ]
Rana, Minahil [1 ]
Shafiq, Akasha [1 ]
Ahmad, Shafiq [2 ]
Akram, Muhammad Arslan [3 ]
Amin, Ruhul [4 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Sahiwal Campus, Islamabad 57000, Pakistan
[2] Bahria Univ, Dept Comp Sci, Lahore 54782, Pakistan
[3] Informat Technol Univ, Dept Comp Sci, Lahore 54000, Punjab, Pakistan
[4] Dr SPM Int Inst Informat Technol, Dept Comp Sci & Engn, Naya Raipur 492002, India
关键词
Authentication; Authentication protocol; Mutual authentication; Impersonation; Anonymity; Multi-server environment; SCHEME; EFFICIENT; SECURITY;
D O I
10.1016/j.jisa.2021.102900
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Y The momentous development in the technology of wireless communication has escalated the wide acceptance of Device to Device (D2D) communication among mobile devices. However, enormous requests of devices may curtail the effectiveness of conventional single-server based authentication frameworks. To overcome such limitation, multi-server authentication framework is introduced. This framework facilitates the devices to use multiple services granted from several servers through single registration via the registration center. In recent ages, numerous multi-server authentication protocols have been developed to securely facilitate the huge amount of devices via variety of servers. Nonetheless, most of these protocols are susceptible to various security threats and proved to be inefficient in terms of computation and communication overheads. In this article, we have proposed an Elliptic Curve Cryptography (ECC) based multi-server authentication framework using Physically Unclonable Function (PUF) for D2D communication. We have shown that our proposed protocol is more secure and robust using Random Oracle Model (ROM). The informal security analysis reveals that proposed protocol accomplishes all security needs of multi-server infrastructure. Further, we have separately computed all cryptographic operations for client, server and Registration Center (RC) to get desired experimental results. The performance analysis illustrates that introduced protocol attains compelling security improvements with least possible computation complexity compared to related protocols. Hence, the strong security features of our proposed protocol demonstrate its strength and make it viable for practical implementation.
引用
收藏
页数:11
相关论文
共 43 条
  • [1] Akgun M., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P473, DOI 10.1109/ARES.2011.73
  • [2] An anonymous authenticated key-agreement scheme for multi-server infrastructure
    Akram, Muhammad Arslan
    Ghaffar, Zahid
    Mahmood, Khalid
    Kumari, Saru
    Agarwal, Kadambri
    Chen, Chien-Ming
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [3] An efficient three factor-based authentication scheme in multiserver environment using ECC
    Ali, Rifaqat
    Pal, Arup Kumar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
  • [4] [Anonymous], 2005, ARXIVCS0504097
  • [5] Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    [J]. IEEE ACCESS, 2019, 7 : 85627 - 85644
  • [6] Bringer J, 2008, LECT NOTES COMPUT SC, V5229, P77, DOI 10.1007/978-3-540-85855-3_6
  • [7] Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
  • [8] An efficient and secure multi-server password authentication scheme using smart cards
    Chang, CC
    Lee, JS
    [J]. 2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, : 417 - 422
  • [9] Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
    Devadas, Srinivas
    Suh, Edward
    Paral, Sid
    Sowell, Richard
    Ziola, Tom
    Khandelwal, Vivek
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON RFID, 2008, : 58 - +
  • [10] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208