4.7 Article

A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT

Journal

IEEE SENSORS JOURNAL
Volume 21, Issue 4, Pages 5487-5501

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSEN.2020.3028872

Keywords

Protocols; Authentication; Servers; Sensors; Internet of Things; Resists; Physical unclonable function (PUF); mutual authentication; key exchange; Internet of Things (IoT)

Funding

  1. Doctoral Innovation Fund [JY2019B162]

Ask authors/readers for more resources

The research proposes an end-to-end mutual authentication and key exchange protocol for IoT devices, combining PUF with CL-PKC, requiring only three handshakes without the real-time participation of the server. The protocol can secure devices from various attacks and provide perfect forward secrecy, outperforming existing related protocols in terms of security features, protocol rounds, and communication cost.
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the unattended and open places, making them vulnerable to physical attacks while facing traditional security threats. Despite several researches have been conducted by using the physical unclonable function (PUF) to immune the communication between IoT devices from the security threats above, as per the knowledge of the authors, current solutions rely on the participation of the server to distribute the key parameters, which requires high message overhead and markedly influences the efficiency. To fill this gap, this article proposes an end-to-end mutual authentication and key exchange protocol for IoT by combining PUF with certificateless public key cryptography (CL-PKC) on elliptic curve, which only needs three handshakes without the real-time participation of the server. The security analysis shows that the proposed protocol can not only secure the IoT devices from various attacks, but also provide perfect forward secrecy. Moreover, the experimental validation and performance analysis show the proposed protocol outperforms existing related protocols in terms of security features, protocol rounds and communication cost.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available