Refillable PUF authentication protocol for constrained devices

被引:0
|
作者
Desuert, Arthur [1 ]
Chollet, Stephanie [1 ]
Pion, Laurent [1 ]
Hely, David [1 ]
机构
[1] Univ Grenoble Alpes, LCIS, Grenoble, France
关键词
Internet of Things (IoT); Physical Unclonable Function (PUF); security; authentication;
D O I
10.3233/AIS-210325
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Connected devices are deployed at a rapid rate and in broad domains like home automation or industry, forming the Internet of Things. Those devices need to be secure and trusted to prevent malicious use. However some connected devices are low-cost, memory constrained, power constrained, etc.. This greatly limits the deployment of usual security solutions. As the absence of security is not acceptable, it is necessary to search for lightweight security solutions adapted to such devices. Physical Unclonable Function (PUF) technology can support new lightweight security mechanisms and several lightweight security protocols using this technology have been proposed over the years. Those protocols look promising, however there are still some unaddressed challenges which have slowed down a large scale adoption. This article presents the design of a new authentication protocol for constrained devices which takes into account those challenges. This protocol is implemented on a hardware platform used for connected devices development, which is then used to evaluate the security level and performances of the protocol in a realistic scenario. This evaluation shows that the protocol is secure and can meet industrial time constraints.
引用
收藏
页码:195 / 212
页数:18
相关论文
共 50 条
  • [31] A PUF secured lightweight mutual authentication protocol for multi-UAV networks
    Chandran, Indu
    Vipin, Kizheppatt
    COMPUTER NETWORKS, 2024, 253
  • [32] A PUF-based anonymous authentication protocol for wireless medical sensor networks
    Shao, Xiaowei
    Guo, Yajun
    Guo, Yimin
    WIRELESS NETWORKS, 2022, 28 (8) : 3753 - 3770
  • [33] PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol
    Yildiz, Husnu
    Cenk, Murat
    Onur, Ertan
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07): : 5682 - 5696
  • [34] A PUF-based anonymous authentication protocol for wireless medical sensor networks
    Xiaowei Shao
    Yajun Guo
    Yimin Guo
    Wireless Networks, 2022, 28 : 3753 - 3770
  • [35] Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
    Bagheri, Nasour
    Bendavid, Ygal
    Safkhani, Masoumeh
    Rostampour, Samad
    FUTURE INTERNET, 2024, 16 (01)
  • [36] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks
    Xie, Qi
    Yao, Ye
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [37] SRAM-PUF Authentication Schemes Empowered with Blockchain on Resource-Constrained Microcontrollers
    Barbareschi, Mario
    Cirillo, Franco
    Esposito, Christian
    2024 IEEE 27TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING, ISORC 2024, 2024,
  • [38] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [39] A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
    Liang, Wei
    Xie, Songyou
    Long, Jing
    Li, Kuan-Ching
    Zhang, Dafang
    Li, Keqin
    INFORMATION SCIENCES, 2019, 503 (129-147) : 129 - 147
  • [40] A Novel RFID Authentication Protocol Based on Reconfigurable RRAM PUF
    Ren, Qirui
    Fu, Xiangqu
    Wu, Hao
    Yang, Kaiqi
    Lei, Dengyun
    Xing, Guozhong
    Zhang, Feng
    MICROMACHINES, 2021, 12 (12)