Cargando…

PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices

In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wi...

Descripción completa

Detalles Bibliográficos
Autores principales: Lee, JoonYoung, Oh, JiHyeon, Kwon, DeokKyu, Kim, MyeongHyun, Yu, SungJin, Jho, Nam-Su, Park, Youngho
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9506519/
https://www.ncbi.nlm.nih.gov/pubmed/36146423
http://dx.doi.org/10.3390/s22187075
_version_ 1784796743057014784
author Lee, JoonYoung
Oh, JiHyeon
Kwon, DeokKyu
Kim, MyeongHyun
Yu, SungJin
Jho, Nam-Su
Park, Youngho
author_facet Lee, JoonYoung
Oh, JiHyeon
Kwon, DeokKyu
Kim, MyeongHyun
Yu, SungJin
Jho, Nam-Su
Park, Youngho
author_sort Lee, JoonYoung
collection PubMed
description In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs. Accordingly, two-factor and three-factor-based authentication protocol research is being actively conducted. However, IoT service users can be vulnerable to ID/password pair guessing attacks by setting easy-to-remember identities and passwords. In addition, sensors and sensing devices deployed in IoT environments are vulnerable to capture attacks. To address this issue, in this paper, we analyze the protocols of Chunka et al., Amintoosi et al., and Hajian et al. and describe their security vulnerabilities. Moreover, this paper introduces PUF and honey list techniques with three-factor authentication to design protocols resistant to ID/password pair guessing, brute-force, and capture attacks. Accordingly, we introduce PUFTAP-IoT, which can provide secure services in the IoT environment. To prove the security of PUFTAP-IoT, we perform formal analyses through Burrows Abadi Needham (BAN) logic, Real-Or-Random (ROR) model, and scyther simulation tools. In addition, we demonstrate the efficiency of the protocol compared with other authentication protocols in terms of security, computational cost, and communication cost, showing that it can provide secure services in IoT environments.
format Online
Article
Text
id pubmed-9506519
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-95065192022-09-24 PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices Lee, JoonYoung Oh, JiHyeon Kwon, DeokKyu Kim, MyeongHyun Yu, SungJin Jho, Nam-Su Park, Youngho Sensors (Basel) Article In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs. Accordingly, two-factor and three-factor-based authentication protocol research is being actively conducted. However, IoT service users can be vulnerable to ID/password pair guessing attacks by setting easy-to-remember identities and passwords. In addition, sensors and sensing devices deployed in IoT environments are vulnerable to capture attacks. To address this issue, in this paper, we analyze the protocols of Chunka et al., Amintoosi et al., and Hajian et al. and describe their security vulnerabilities. Moreover, this paper introduces PUF and honey list techniques with three-factor authentication to design protocols resistant to ID/password pair guessing, brute-force, and capture attacks. Accordingly, we introduce PUFTAP-IoT, which can provide secure services in the IoT environment. To prove the security of PUFTAP-IoT, we perform formal analyses through Burrows Abadi Needham (BAN) logic, Real-Or-Random (ROR) model, and scyther simulation tools. In addition, we demonstrate the efficiency of the protocol compared with other authentication protocols in terms of security, computational cost, and communication cost, showing that it can provide secure services in IoT environments. MDPI 2022-09-19 /pmc/articles/PMC9506519/ /pubmed/36146423 http://dx.doi.org/10.3390/s22187075 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Lee, JoonYoung
Oh, JiHyeon
Kwon, DeokKyu
Kim, MyeongHyun
Yu, SungJin
Jho, Nam-Su
Park, Youngho
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
title PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
title_full PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
title_fullStr PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
title_full_unstemmed PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
title_short PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
title_sort puftap-iot: puf-based three-factor authentication protocol in iot environment focused on sensing devices
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9506519/
https://www.ncbi.nlm.nih.gov/pubmed/36146423
http://dx.doi.org/10.3390/s22187075
work_keys_str_mv AT leejoonyoung puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices
AT ohjihyeon puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices
AT kwondeokkyu puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices
AT kimmyeonghyun puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices
AT yusungjin puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices
AT jhonamsu puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices
AT parkyoungho puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices