4.7 Article

Three-factor authentication protocol using physical unclonable function for IoV

Journal

COMPUTER COMMUNICATIONS
Volume 173, Issue -, Pages 45-55

Publisher

ELSEVIER
DOI: 10.1016/j.comcom.2021.03.022

Keywords

Internet of Vehicles; PUF; Physical attack; Mutual authentication; Three-factor authentication

Funding

  1. National Natural Science Foundation of China [62072352, U1708262, 61902290, 61772008]
  2. project The Verification Platform of Multi-tier Coverage Communication Network for oceans [LZC0020]
  3. Fundamental Research Funds for the Central Universities, China [JBF211503]
  4. Education Department of Shaanxi Province, China [20JY016]
  5. Guangxi Key Laboratory of Trusted Software, China [KX202035]
  6. Natural Science Foundation of Guangxi Province, China [2019GXNSFBA245049]

Ask authors/readers for more resources

Internet of Vehicles (IoV) plays a crucial role in transportation sector, but security and privacy issues are pressing. The integration of physical unclonable function (PUF) technology ensures system security, and the combination of password, biometrics, and PUF prevents unauthorized access to user devices.
As an extension of Internet of Things (IoT) in transportation sector, the Internet of Vehicles (IoV) can greatly facilitate vehicle management and route planning. With ever-increasing penetration of IoV, the security and privacy of driving data should be guaranteed. Moreover, since vehicles are often left unattended with minimum human interventions, the onboard sensors are vulnerable to physical attacks. Therefore, the physically secure authentication and key exchange (AKE) protocol is urgently needed for IoV to implement access control and information protection. In this paper, physical unclonable function (PUF) is introduced in the AKE protocol to ensure that the system is secure even if the user devices or sensors are compromised. Specifically, PUF, as a hardware fingerprint generator, eliminates the storage of any secret information in user devices or vehicle sensors. By combining password, biometrics with PUF, the user device cannot be used by someone else to be successfully authenticated as the user. Finally, the elaborate security analysis demonstrates that the proposed protocol is free from the influence of known attacks and can achieve expected security properties, and the performance evaluation indicates the efficiency of our protocol.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available