Cargando…
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wi...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9506519/ https://www.ncbi.nlm.nih.gov/pubmed/36146423 http://dx.doi.org/10.3390/s22187075 |
_version_ | 1784796743057014784 |
---|---|
author | Lee, JoonYoung Oh, JiHyeon Kwon, DeokKyu Kim, MyeongHyun Yu, SungJin Jho, Nam-Su Park, Youngho |
author_facet | Lee, JoonYoung Oh, JiHyeon Kwon, DeokKyu Kim, MyeongHyun Yu, SungJin Jho, Nam-Su Park, Youngho |
author_sort | Lee, JoonYoung |
collection | PubMed |
description | In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs. Accordingly, two-factor and three-factor-based authentication protocol research is being actively conducted. However, IoT service users can be vulnerable to ID/password pair guessing attacks by setting easy-to-remember identities and passwords. In addition, sensors and sensing devices deployed in IoT environments are vulnerable to capture attacks. To address this issue, in this paper, we analyze the protocols of Chunka et al., Amintoosi et al., and Hajian et al. and describe their security vulnerabilities. Moreover, this paper introduces PUF and honey list techniques with three-factor authentication to design protocols resistant to ID/password pair guessing, brute-force, and capture attacks. Accordingly, we introduce PUFTAP-IoT, which can provide secure services in the IoT environment. To prove the security of PUFTAP-IoT, we perform formal analyses through Burrows Abadi Needham (BAN) logic, Real-Or-Random (ROR) model, and scyther simulation tools. In addition, we demonstrate the efficiency of the protocol compared with other authentication protocols in terms of security, computational cost, and communication cost, showing that it can provide secure services in IoT environments. |
format | Online Article Text |
id | pubmed-9506519 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-95065192022-09-24 PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices Lee, JoonYoung Oh, JiHyeon Kwon, DeokKyu Kim, MyeongHyun Yu, SungJin Jho, Nam-Su Park, Youngho Sensors (Basel) Article In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs. Accordingly, two-factor and three-factor-based authentication protocol research is being actively conducted. However, IoT service users can be vulnerable to ID/password pair guessing attacks by setting easy-to-remember identities and passwords. In addition, sensors and sensing devices deployed in IoT environments are vulnerable to capture attacks. To address this issue, in this paper, we analyze the protocols of Chunka et al., Amintoosi et al., and Hajian et al. and describe their security vulnerabilities. Moreover, this paper introduces PUF and honey list techniques with three-factor authentication to design protocols resistant to ID/password pair guessing, brute-force, and capture attacks. Accordingly, we introduce PUFTAP-IoT, which can provide secure services in the IoT environment. To prove the security of PUFTAP-IoT, we perform formal analyses through Burrows Abadi Needham (BAN) logic, Real-Or-Random (ROR) model, and scyther simulation tools. In addition, we demonstrate the efficiency of the protocol compared with other authentication protocols in terms of security, computational cost, and communication cost, showing that it can provide secure services in IoT environments. MDPI 2022-09-19 /pmc/articles/PMC9506519/ /pubmed/36146423 http://dx.doi.org/10.3390/s22187075 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lee, JoonYoung Oh, JiHyeon Kwon, DeokKyu Kim, MyeongHyun Yu, SungJin Jho, Nam-Su Park, Youngho PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices |
title | PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices |
title_full | PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices |
title_fullStr | PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices |
title_full_unstemmed | PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices |
title_short | PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices |
title_sort | puftap-iot: puf-based three-factor authentication protocol in iot environment focused on sensing devices |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9506519/ https://www.ncbi.nlm.nih.gov/pubmed/36146423 http://dx.doi.org/10.3390/s22187075 |
work_keys_str_mv | AT leejoonyoung puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices AT ohjihyeon puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices AT kwondeokkyu puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices AT kimmyeonghyun puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices AT yusungjin puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices AT jhonamsu puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices AT parkyoungho puftapiotpufbasedthreefactorauthenticationprotocoliniotenvironmentfocusedonsensingdevices |