Cargando…
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7472131/ https://www.ncbi.nlm.nih.gov/pubmed/32764285 http://dx.doi.org/10.3390/s20164361 |
_version_ | 1783578918267125760 |
---|---|
author | Mostafa, Ahmed Lee, Suk Jin Peker, Yesem Kurt |
author_facet | Mostafa, Ahmed Lee, Suk Jin Peker, Yesem Kurt |
author_sort | Mostafa, Ahmed |
collection | PubMed |
description | Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments. |
format | Online Article Text |
id | pubmed-7472131 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-74721312020-09-04 Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices Mostafa, Ahmed Lee, Suk Jin Peker, Yesem Kurt Sensors (Basel) Article Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments. MDPI 2020-08-05 /pmc/articles/PMC7472131/ /pubmed/32764285 http://dx.doi.org/10.3390/s20164361 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Mostafa, Ahmed Lee, Suk Jin Peker, Yesem Kurt Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices |
title | Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices |
title_full | Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices |
title_fullStr | Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices |
title_full_unstemmed | Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices |
title_short | Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices |
title_sort | physical unclonable function and hashing are all you need to mutually authenticate iot devices |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7472131/ https://www.ncbi.nlm.nih.gov/pubmed/32764285 http://dx.doi.org/10.3390/s20164361 |
work_keys_str_mv | AT mostafaahmed physicalunclonablefunctionandhashingareallyouneedtomutuallyauthenticateiotdevices AT leesukjin physicalunclonablefunctionandhashingareallyouneedtomutuallyauthenticateiotdevices AT pekeryesemkurt physicalunclonablefunctionandhashingareallyouneedtomutuallyauthenticateiotdevices |