Refillable PUF authentication protocol for constrained devices

被引:0
|
作者
Desuert, Arthur [1 ]
Chollet, Stephanie [1 ]
Pion, Laurent [1 ]
Hely, David [1 ]
机构
[1] Univ Grenoble Alpes, LCIS, Grenoble, France
关键词
Internet of Things (IoT); Physical Unclonable Function (PUF); security; authentication;
D O I
10.3233/AIS-210325
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Connected devices are deployed at a rapid rate and in broad domains like home automation or industry, forming the Internet of Things. Those devices need to be secure and trusted to prevent malicious use. However some connected devices are low-cost, memory constrained, power constrained, etc.. This greatly limits the deployment of usual security solutions. As the absence of security is not acceptable, it is necessary to search for lightweight security solutions adapted to such devices. Physical Unclonable Function (PUF) technology can support new lightweight security mechanisms and several lightweight security protocols using this technology have been proposed over the years. Those protocols look promising, however there are still some unaddressed challenges which have slowed down a large scale adoption. This article presents the design of a new authentication protocol for constrained devices which takes into account those challenges. This protocol is implemented on a hardware platform used for connected devices development, which is then used to evaluate the security level and performances of the protocol in a realistic scenario. This evaluation shows that the protocol is secure and can meet industrial time constraints.
引用
收藏
页码:195 / 212
页数:18
相关论文
共 50 条
  • [1] A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
    Idriss, Tarek A.
    Idriss, Haytham A.
    Bayoumi, Magdy A.
    IEEE ACCESS, 2021, 9 : 80546 - 80558
  • [2] PUF-Based Protocol for Securing Constrained Devices
    Desuert, Arthur
    Chollet, Stephanie
    Pion, Laurent
    Hely, David
    2021 17TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENVIRONMENTS (IE), 2021,
  • [3] A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT Devices
    Ebrahimabadi, Mohammad
    Younis, Mohamed
    Karimi, Naghmeh
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3684 - 3703
  • [4] Lightweight PUF-Based Authentication Protocol for IoT Devices
    Yilmaz, Yildiran
    Gunn, Steve R.
    Halak, Basel
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 38 - 43
  • [5] Restoration Protocol: Lightweight and Secure Devices Authentication Based on PUF
    Ovilla-Martinez, Brisbane
    Bossuet, Lilian
    2017 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2017, : 43 - 48
  • [6] PUF Based Authentication Protocol for IoT
    Braeken, An
    SYMMETRY-BASEL, 2018, 10 (08):
  • [7] SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices
    Farha, Fadi
    Ning, Huansheng
    Ali, Karim
    Chen, Liming
    Nugent, Christopher
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5904 - 5913
  • [8] A Lightweight RFID Mutual Authentication Protocol with PUF
    Zhu, Feng
    Li, Peng
    Xu, He
    Wang, Ruchuan
    SENSORS, 2019, 19 (13)
  • [9] PhenoAuth: A Novel PUF-Phenotype-based Authentication Protocol for IoT Devices
    Fei, Hongming
    Millwood, Owen
    Gope, Prosanta
    Miskelly, Jack
    Sikdar, Biplab
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST, HOST, 2024, : 309 - 319
  • [10] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)