Advertisement

A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function

  • Priyanka Mall
  • Md Zakirul Alam Bhuiyan
  • Ruhul AminEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)

Abstract

The fast-growing connected world has increased the dynamic demands of the Internet of things (IoT) in different sectors, and the main challenges for the IoT devices are low memory and limited computational power. In addition, the number of assailant and security threats in IoT communication are increasing rapidly. Several cryptographic mechanisms/operations have been proposed in order to prevent IoT security threats, which are mainly computationally-heavy in nature. Currently, physically unclonable function (PUF) plays an important role in designing efficient cryptographic protocols in comparison with other crypto-operations due to its light-weight process. In this paper, we revisit PUF-based authentication protocol for secure communication in IoT proposed by Braeken (2018) and identified its loopholes. From there, we design a new protocol for secure communication by utilizing PUF operation. The main objective of our protocol is to provide top-level security with less computation cost for faster responses. Our simulation results, using Scyther tool, confirm that all the private information is protected during protocol run and all the related security attacks could be protected through informal analysis. The performance of our protocol is shown to be better in terms of communication and computation overhead compared with two peer protocols.

Keywords

Physically Unclonable Function (PUF) Internet of Things (IoT) Device authentication 

References

  1. 1.
    Kim, D.: Performance of UWB wireless telecommunication positioning for disaster relief communication environment securing. Sustainability 10(11), 3857 (2018)CrossRefGoogle Scholar
  2. 2.
    Das, A.K., Zeadally, S., He, D.: Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89, 110–125 (2018)CrossRefGoogle Scholar
  3. 3.
    Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(3), 67 (2017)Google Scholar
  4. 4.
    Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262–277. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-04474-8_22CrossRefGoogle Scholar
  5. 5.
    Feng, J., Yang, L.T., Zhu, Q., Choo, K.-K.R.: Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Dependable Secure Comput. (2018)Google Scholar
  6. 6.
    Feng, J., Yang, L.T., Zhang, R.: Practical privacy-preserving high-order bi-lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Trans. Internet Technol. (TOIT) 19(2), 26 (2019)CrossRefGoogle Scholar
  7. 7.
    Mahalle, P.N., Prasad, N.R., Prasad, R.: Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT). In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1–5. IEEE (2014)Google Scholar
  8. 8.
    Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 2728–2733. IEEE (2014)Google Scholar
  9. 9.
    Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1–6. IEEE (2015)Google Scholar
  10. 10.
    Edward Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM/IEEE Design Automation Conference, pp. 9–14. IEEE (2007)Google Scholar
  11. 11.
    Braeken, A.: PUF based authentication protocol for IoT. Symmetry 10(8), 352 (2018)CrossRefGoogle Scholar
  12. 12.
    Cremers, C.J.F.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 119–128. ACM (2008)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Priyanka Mall
    • 1
  • Md Zakirul Alam Bhuiyan
    • 2
  • Ruhul Amin
    • 1
    Email author
  1. 1.Department of Computer Science and EngineeringDRSPM International Institute of Information Technology, Naya RaipurAtal NagarIndia
  2. 2.Department of Computer and Information SciencesFordham UniversityBronxUSA

Personalised recommendations