PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home

被引:18
作者
Xia, Yandong [1 ,2 ]
Qi, Rongxin [1 ,2 ]
Ji, Sai [1 ,2 ]
Shen, Jian [1 ,2 ,3 ]
Miao, Tiantian [1 ,2 ]
Wang, Huaqun [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Nanjing, Peoples R China
[2] Jiangsu Engn Ctr Network Monitoring, Nanjing, Peoples R China
[3] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Fiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Peoples R China
基金
中国国家自然科学基金;
关键词
USER AUTHENTICATION; SCHEME; SECURITY; SIGNATURE; EXCHANGE; INTERNET;
D O I
10.1155/2022/8865158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various IoT-based applications such as smart home, intelligent medical, and VANETs have been put into practical utilization. The smart home is one of the most concerned environments, allowing users to access and control smart devices via the public network remotely. The smart home can provide many intelligent services for users through these smart devices. To securely access devices and obtain collected data over the public network, multifactor authentication protocols for smart home have gained wide attention. However, most of these protocols cannot withstand impersonation attack, smart device lost attack, privileged-insider attack, smart card lost attack, and so on. Besides, high communication and computational costs weaken the system performance, which leads to most authentication protocols are not suitable for resource-constrained smart devices. To mitigate the aforementioned drawbacks, we proposed a PUF-assisted lightweight group authentication and key agreement protocol to implement secure access to multiple devices in the smart home simultaneously using the Chinese Remainder Theorem and secret sharing technique. Our protocol also utilizes physical unclonable function (PUF) and fuzzy extractor technique to extract the digital fingerprint of the smart devices, which can uniquely validate smart devices and protect the secrets stored in their memory. Our protocol can support various security features and withstand the many well-known attacks in the smart home. The performance analysis indicates that the proposed protocol can efficiently reduce communication/computational costs when the user simultaneously accesses multiple devices.
引用
收藏
页数:15
相关论文
共 48 条
[1]   Password-based authenticated key exchange in the three-party setting [J].
Abdalla, M. ;
Fouque, P.-A. ;
Pointcheval, D. .
IEE Proceedings: Information Security, 2006, 153 (01) :27-39
[2]   An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Park, Youngho .
SENSORS, 2020, 20 (04)
[3]   Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Chattopadhyay, Samiran ;
Rodrigues, Joel J. P. C. ;
Park, Youngho .
IEEE ACCESS, 2019, 7 :85627-85644
[4]   PUF Based Authentication Protocol for IoT [J].
Braeken, An .
SYMMETRY-BASEL, 2018, 10 (08)
[5]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[6]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337
[7]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[8]   Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database [J].
Chatterjee, Urbi ;
Govindan, Vidya ;
Sadhukhan, Rajat ;
Mukhopadhyay, Debdeep ;
Chakraborty, Rajat Subhra ;
Mahata, Debashis ;
Prabhu, Mukesh M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) :424-437
[9]   A PUF-Based Secure Communication Protocol for IoT [J].
Chatterjee, Urbi ;
Chakraborty, Rajat Subhra ;
Mukhopadhyay, Debdeep .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
[10]   Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing [J].
Chen, Shuai ;
Li, Bing ;
Chen, Ziheng ;
Zhang, Yan ;
Wang, Caicai ;
Tao, Cheng .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) :14408-14425