PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs
Open Access
- 9 August 2021
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Access
- Vol. 9, 112733-112743
- https://doi.org/10.1109/access.2021.3103889
Abstract
A Physical Unclonable Function (PUF) provides a physical device a unique output for a given input, which can be regarded as the device’s digital fingerprint. Thus, PUFs can provide unique identities for billions of connected devices in Internet of Things (IoT) architectures. Plenty of PUF based authenticated key exchange (AKE) protocols have been proposed. However, most of them are designed for the authentication between an IoT node and the specific server/verifier, whom the IoT node registered with. Only a few of them are designed for the authentication between IoT nodes, and all these protocols need verifiers or explicit Challenge-Response Pairs (CRPs). In this paper, we propose the first PUF based AKE protocol for IoT without verifiers and explicit CRPs, which IoT nodes can freely authenticate each other and create a session key on their own without the help of any server or verifier. We compare the proposed protocol with 27 relevant PUF based AKE protocols to show the superiority, and analyze the computational cost of each entity in the proposed protocol to show the efficiency. We define the adversarial model of a PUF based AKE protocol for IoT and formally prove the security of the proposed protocol in random oracle model. The security of the proposed protocol is based on the Elliptic Curve Discrete Logarithm (ECDL), Elliptic Curve Computational Diffie-Hellman (ECCDH), and Decisional Bilinear Diffie-Hellman (DBDH) assumptions.Funding Information
- Ministry of Science and Technology, Taiwan (110-2221-E-002-073-MY2, 108-2221-E-002-073-MY3)
This publication has 40 references indexed in Scilit:
- Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring MatchingIEEE Transactions on Emerging Topics in Computing, 2014
- Converse PUF-Based AuthenticationLecture Notes in Computer Science, 2012
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- Implementing Cryptographic Pairings on SmartcardsLecture Notes in Computer Science, 2006
- Secret Key Generation from Classical Physics: Physical Uncloneable FunctionsPublished by Springer Science and Business Media LLC ,2006
- ID-based Authenticated Key Agreement for Low-Power Mobile DevicesLecture Notes in Computer Science, 2005
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataLecture Notes in Computer Science, 2004
- Efficient ID-based Group Key Agreement with Bilinear MapsLecture Notes in Computer Science, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Identity-Based Encryption from the Weil PairingLecture Notes in Computer Science, 2001