4.8 Article

Joint Heterogeneous PUF-Based Security-Enhanced IoT Authentication

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 10, 期 20, 页码 18082-18096

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2023.3279847

关键词

Channel state information (CSI); Internet of Things (IoT); IoT authentication; physical unclonable function (PUF); radio frequency (RF) fingerprint

向作者/读者索取更多资源

This study proposes a novel authentication scheme that provides enhanced security for Internet of Things (IoT) applications by integrating a radio frequency physical unclonable function (PUF) with a device PUF. The scheme effectively defends against diverse attacks by using the physical layer features of wireless channels and the device PUF's characteristics to generate the cryptographic key.
This study proposes a novel authentication scheme that provides enhanced security for Internet of Things (IoT) applications by integrating a radio frequency (RF) physical unclonable function (PUF) with a device PUF. While traditional PUF-based authentication methods are lightweight, they are vulnerable to replay attacks because challenge-response pairs (CRPs) are exposed to adversaries over wireless channels. To prevent CRP exposure, we propose a joint scheme that integrates the physical layer features of wireless channels with those of the device PUF. Our authentication process consists of two stages: an enrollment stage and an authentication stage. During the enrollment stage, the physical features of the static random-access memory (SRAM) in the IoT devices are shared with the server, which generates a hashing model using the amplitudes of channel state information (CSI) as the RF-PUF and transfers it to the IoT device. In the authentication stage, the server and IoT devices exchange pilot signals to estimate the shared CSI. Both parties then generate the challenge information using the hashing model, which depends on the CSI. The challenge information is mapped to the response of the device PUF as the cryptographic key. If both parties are legitimate, the proposed model is updated through CSI amplitudes. We evaluated the proposed authentication protocol using a testbed based on Raspberry Pi and acquired a CSI data set and SRAM-PUF using universal software radio peripheral and Arduino, respectively. Numerical results demonstrate that our method effectively defends against diverse attacks, even in critical CRP exposure scenarios.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据