Skip to main content

A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2019)

Abstract

The fast-growing connected world has increased the dynamic demands of the Internet of things (IoT) in different sectors, and the main challenges for the IoT devices are low memory and limited computational power. In addition, the number of assailant and security threats in IoT communication are increasing rapidly. Several cryptographic mechanisms/operations have been proposed in order to prevent IoT security threats, which are mainly computationally-heavy in nature. Currently, physically unclonable function (PUF) plays an important role in designing efficient cryptographic protocols in comparison with other crypto-operations due to its light-weight process. In this paper, we revisit PUF-based authentication protocol for secure communication in IoT proposed by Braeken (2018) and identified its loopholes. From there, we design a new protocol for secure communication by utilizing PUF operation. The main objective of our protocol is to provide top-level security with less computation cost for faster responses. Our simulation results, using Scyther tool, confirm that all the private information is protected during protocol run and all the related security attacks could be protected through informal analysis. The performance of our protocol is shown to be better in terms of communication and computation overhead compared with two peer protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, D.: Performance of UWB wireless telecommunication positioning for disaster relief communication environment securing. Sustainability 10(11), 3857 (2018)

    Article  Google Scholar 

  2. Das, A.K., Zeadally, S., He, D.: Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89, 110–125 (2018)

    Article  Google Scholar 

  3. Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(3), 67 (2017)

    Google Scholar 

  4. Frikken, K.B., Blanton, M., Atallah, M.J.: Robust authentication using physically unclonable functions. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 262–277. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04474-8_22

    Chapter  Google Scholar 

  5. Feng, J., Yang, L.T., Zhu, Q., Choo, K.-K.R.: Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Dependable Secure Comput. (2018)

    Google Scholar 

  6. Feng, J., Yang, L.T., Zhang, R.: Practical privacy-preserving high-order bi-lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Trans. Internet Technol. (TOIT) 19(2), 26 (2019)

    Article  Google Scholar 

  7. Mahalle, P.N., Prasad, N.R., Prasad, R.: Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT). In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), pp. 1–5. IEEE (2014)

    Google Scholar 

  8. Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 2728–2733. IEEE (2014)

    Google Scholar 

  9. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), pp. 1–6. IEEE (2015)

    Google Scholar 

  10. Edward Suh, G., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM/IEEE Design Automation Conference, pp. 9–14. IEEE (2007)

    Google Scholar 

  11. Braeken, A.: PUF based authentication protocol for IoT. Symmetry 10(8), 352 (2018)

    Article  Google Scholar 

  12. Cremers, C.J.F.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 119–128. ACM (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruhul Amin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mall, P., Bhuiyan, M.Z.A., Amin, R. (2019). A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24907-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24906-9

  • Online ISBN: 978-3-030-24907-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics