Abstract
The fast-growing connected world has increased the dynamic demands of the Internet of things (IoT) in different sectors, and the main challenges for the IoT devices are low memory and limited computational power. In addition, the number of assailant and security threats in IoT communication are increasing rapidly. Several cryptographic mechanisms/operations have been proposed in order to prevent IoT security threats, which are mainly computationally-heavy in nature. Currently, physically unclonable function (PUF) plays an important role in designing efficient cryptographic protocols in comparison with other crypto-operations due to its light-weight process. In this paper, we revisit PUF-based authentication protocol for secure communication in IoT proposed by Braeken (2018) and identified its loopholes. From there, we design a new protocol for secure communication by utilizing PUF operation. The main objective of our protocol is to provide top-level security with less computation cost for faster responses. Our simulation results, using Scyther tool, confirm that all the private information is protected during protocol run and all the related security attacks could be protected through informal analysis. The performance of our protocol is shown to be better in terms of communication and computation overhead compared with two peer protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, D.: Performance of UWB wireless telecommunication positioning for disaster relief communication environment securing. Sustainability 10(11), 3857 (2018)
Das, A.K., Zeadally, S., He, D.: Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89, 110–125 (2018)
Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(3), 67 (2017)
Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262–277. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04474-8_22
Feng, J., Yang, L.T., Zhu, Q., Choo, K.-K.R.: Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Dependable Secure Comput. (2018)
Feng, J., Yang, L.T., Zhang, R.: Practical privacy-preserving high-order bi-lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Trans. Internet Technol. (TOIT) 19(2), 26 (2019)
Mahalle, P.N., Prasad, N.R., Prasad, R.: Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT). In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1–5. IEEE (2014)
Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 2728–2733. IEEE (2014)
Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1–6. IEEE (2015)
Edward Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM/IEEE Design Automation Conference, pp. 9–14. IEEE (2007)
Braeken, A.: PUF based authentication protocol for IoT. Symmetry 10(8), 352 (2018)
Cremers, C.J.F.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 119–128. ACM (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mall, P., Bhuiyan, M.Z.A., Amin, R. (2019). A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-24907-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24906-9
Online ISBN: 978-3-030-24907-6
eBook Packages: Computer ScienceComputer Science (R0)