4.7 Article

FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices

Journal

INTERNET OF THINGS
Volume 21, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.iot.2023.100685

Keywords

Internet of Things; Multi-factor authentication; PUF; Fuzzy extractor; Firmware security

Ask authors/readers for more resources

With the rapid development of 5G mobile communication technology and the expansion of the IoT industry, the number of IoT devices has grown exponentially. Uneven security guarantees and threats to IoT devices and systems prompted the proposal of a Firmware-Secure Multi-Factor Authentication protocol based on PUF and device firmware integrity, achieving mutual authentication and key negotiation between devices and servers. The proposed protocol also includes challenge response pairs and a firmware update scheme to ensure the safety of the device's life cycle.
With the rapid development of 5G mobile communication technology and the continuous expansion of the scale of the Internet of Things (IoT) industry, the number of IoT devices has grown exponentially. IoT devices have uneven security guarantees due to different application scenarios, which brings great security threats to the devices themselves and the IoT system. Especially with the physical threats of the device and firmware tampering, attackers can even make your home's sweeping robot a spy by modifying the firmware. In view of these threats, this paper proposes a FSMFA: Firmware-Secure Multi-Factor Authentication protocol based on PUF (physical unclonable function) and device firmware integrity, which enhance the physical and software security of IoT devices while enhancing the security of IoT system. So as to realize mutual authentication and key negotiation between the device and the server. At the same time, in order to guarantee the safety of the whole life cycle of the device, we propose the challenge response pairs (CRP s) and firmware update scheme of the device. Finally, we use BAN logic and ProVerif to prove the security of authentication and update protocols. Compared with other similar protocols, the proposed protocol achieves better security and higher efficiency.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available