Cargando…

Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices

Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as...

Descripción completa

Detalles Bibliográficos
Autores principales: Mostafa, Ahmed, Lee, Suk Jin, Peker, Yesem Kurt
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7472131/
https://www.ncbi.nlm.nih.gov/pubmed/32764285
http://dx.doi.org/10.3390/s20164361
_version_ 1783578918267125760
author Mostafa, Ahmed
Lee, Suk Jin
Peker, Yesem Kurt
author_facet Mostafa, Ahmed
Lee, Suk Jin
Peker, Yesem Kurt
author_sort Mostafa, Ahmed
collection PubMed
description Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments.
format Online
Article
Text
id pubmed-7472131
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-74721312020-09-04 Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices Mostafa, Ahmed Lee, Suk Jin Peker, Yesem Kurt Sensors (Basel) Article Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments. MDPI 2020-08-05 /pmc/articles/PMC7472131/ /pubmed/32764285 http://dx.doi.org/10.3390/s20164361 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mostafa, Ahmed
Lee, Suk Jin
Peker, Yesem Kurt
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
title Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
title_full Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
title_fullStr Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
title_full_unstemmed Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
title_short Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
title_sort physical unclonable function and hashing are all you need to mutually authenticate iot devices
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7472131/
https://www.ncbi.nlm.nih.gov/pubmed/32764285
http://dx.doi.org/10.3390/s20164361
work_keys_str_mv AT mostafaahmed physicalunclonablefunctionandhashingareallyouneedtomutuallyauthenticateiotdevices
AT leesukjin physicalunclonablefunctionandhashingareallyouneedtomutuallyauthenticateiotdevices
AT pekeryesemkurt physicalunclonablefunctionandhashingareallyouneedtomutuallyauthenticateiotdevices