Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/174143
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZheng, Yueen_US
dc.contributor.authorLiu, Wenyeen_US
dc.contributor.authorChang, Chip Hongen_US
dc.date.accessioned2024-03-18T06:32:07Z-
dc.date.available2024-03-18T06:32:07Z-
dc.date.issued2023-
dc.identifier.citationZheng, Y., Liu, W. & Chang, C. H. (2023). A lightweight PUF-based secure group key agreement protocol for wireless sensor networks. 2023 IEEE International Symposium on Circuits and Systems (ISCAS). https://dx.doi.org/10.1109/ISCAS46773.2023.10181666en_US
dc.identifier.isbn9781665451093-
dc.identifier.issn2158-1525-
dc.identifier.urihttps://hdl.handle.net/10356/174143-
dc.description.abstractWireless sensor networks (WSNs) have gained considerable popularity in a wide range of applications such as military, healthcare, transportations, and environmental sensing. Data produced in these applications is highly sensitive and requires a high level of security protection. However, individual nodes in WSNs are typically resource constrained and have limited computing power to protect memory stored secrets, which are vulnerable to tampering and physical probing. As group messaging is commonly used in WSNs for efficient message exchanges among sensor nodes, this paper presents a lightweight secure group key agreement protocol using Physical Unclonable Function (PUF) as a hardware root of trust. The proposed scheme establishes secure group authentication and group session key simultaneously for all participating members of the group without resorting to complex public-key algorithms. By hiding the prover's authentication secrets in a secure mask, the verifier does not have to store the secrets but recover them for authentication by querying its PUF. The proposed protocol enables lightweight cluster head authentication at the sensor node and prevents stolen-verifier attack at the cluster head. Besides, it is robust against memory probing attacks at all group devices and man-in-the-middle attacks on the communication channel. Among existing PUF-based group key establishment protocols, it requires zero secret storage cost and exhibits excellent overall computation and communication performance.en_US
dc.description.sponsorshipMinistry of Education (MOE)en_US
dc.language.isoenen_US
dc.relationMOET2EP50220- 0003en_US
dc.rights© 2023 IEEE. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1109/ISCAS46773.2023.10181666.en_US
dc.subjectEngineeringen_US
dc.titleA lightweight PUF-based secure group key agreement protocol for wireless sensor networksen_US
dc.typeConference Paperen
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.contributor.conference2023 IEEE International Symposium on Circuits and Systems (ISCAS)en_US
dc.identifier.doi10.1109/ISCAS46773.2023.10181666-
dc.description.versionSubmitted/Accepted versionen_US
dc.identifier.scopus2-s2.0-85167695926-
dc.subject.keywordsPerformance evaluationen_US
dc.subject.keywordsWireless sensor networksen_US
dc.citation.conferencelocationMonterey, CA, USAen_US
dc.description.acknowledgementThis research is supported by the Ministry of Education, Singapore, under its AcRF Tier 2 Award No MOET2EP50220- 0003.en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:EEE Conference Papers
Files in This Item:
File Description SizeFormat 
iscas2023_groupkey.pdf4.47 MBAdobe PDFThumbnail
View/Open

Page view(s)

78
Updated on Oct 3, 2024

Download(s) 50

30
Updated on Oct 3, 2024

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.