Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/162780
Title: PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications
Authors: Zheng, Yue
Liu, Wenye
Gu, Chongyan
Chang, Chip Hong
Keywords: Engineering::Electrical and electronic engineering
Issue Date: 2022
Source: Zheng, Y., Liu, W., Gu, C. & Chang, C. H. (2022). PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Transactions On Dependable and Secure Computing. https://dx.doi.org/10.1109/TDSC.2022.3193570
Project: MOE-T2EP50220- 0003
Journal: IEEE Transactions on Dependable and Secure Computing
Abstract: Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its lower latency and higher privacy compared to database-driven or server-based IoT. However, wireless vulnerabilities raise severe concerns on IoT device-to-device communication. This is further aggravated by the challenge to achieve lightweight direct mutual authentication and secure key exchange between IoT peer nodes in P2P IoT applications. Physical unclonable function (PUF) is a key enabler to lightweight, low-power and secure authentication of resource-constrained devices in IoT. Nevertheless, current PUF-enabled authentication protocols, with or without the challenge-response pairs (CRPs) of each of its interlocutors stored in the verifier’s side, are incompatible for P2P IoT scenarios due to the security, storage and computing power limitations of IoT devices. To solve this problem, a new lightweight PUF-based mutual authentication and key exchange protocol is proposed. It allows two resource-constrained PUF embedded endpoint devices to authenticate each other directly without the need for local storage of CRPs or any private secrets, and simultaneously establish the session key for secure data exchange without resorting to the public-key algorithm. The proposed protocol is evaluated using the game-based formal security analysis method as well as the automatic security analysis tool ProVerif to corroborate its mutual authenticity, secrecy, and resistance against replay and man-in-the-middle (MITM) attacks. Using two Avnet Ultra96-V2 boards to emulate the two IoT endpoint devices, a physical prototype system is also constructed to demonstrate and validate the feasibility of the proposed secure P2P connection scheme. A comparative analysis shows that the proposed protocol outperforms related protocols in terms of security features, computational complexity as well as communication and storage costs.
URI: https://hdl.handle.net/10356/162780
ISSN: 1545-5971
DOI: 10.1109/TDSC.2022.3193570
Rights: © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TDSC.2022.3193570.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Journal Articles

Files in This Item:
File Description SizeFormat 
tdsc_manuscript_2021.pdfPUF-based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications5.73 MBAdobe PDFView/Open

SCOPUSTM   
Citations 50

1
Updated on Nov 24, 2022

Page view(s)

11
Updated on Nov 25, 2022

Download(s)

1
Updated on Nov 25, 2022

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.