期刊
IEEE SENSORS JOURNAL
卷 21, 期 4, 页码 5487-5501出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSEN.2020.3028872
关键词
Protocols; Authentication; Servers; Sensors; Internet of Things; Resists; Physical unclonable function (PUF); mutual authentication; key exchange; Internet of Things (IoT)
资金
- Doctoral Innovation Fund [JY2019B162]
The research proposes an end-to-end mutual authentication and key exchange protocol for IoT devices, combining PUF with CL-PKC, requiring only three handshakes without the real-time participation of the server. The protocol can secure devices from various attacks and provide perfect forward secrecy, outperforming existing related protocols in terms of security features, protocol rounds, and communication cost.
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the unattended and open places, making them vulnerable to physical attacks while facing traditional security threats. Despite several researches have been conducted by using the physical unclonable function (PUF) to immune the communication between IoT devices from the security threats above, as per the knowledge of the authors, current solutions rely on the participation of the server to distribute the key parameters, which requires high message overhead and markedly influences the efficiency. To fill this gap, this article proposes an end-to-end mutual authentication and key exchange protocol for IoT by combining PUF with certificateless public key cryptography (CL-PKC) on elliptic curve, which only needs three handshakes without the real-time participation of the server. The security analysis shows that the proposed protocol can not only secure the IoT devices from various attacks, but also provide perfect forward secrecy. Moreover, the experimental validation and performance analysis show the proposed protocol outperforms existing related protocols in terms of security features, protocol rounds and communication cost.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据