Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
Top Cited Papers
- 12 June 2018
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Internet of Things Journal
- Vol. 6 (1), 580-589
- https://doi.org/10.1109/jiot.2018.2846299
Abstract
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol designed for IoT devices should be robust even in cases when an IoT device is captured by an adversary. Moreover, many of the IoT devices have limited storage and computational capabilities. Hence, it is desirable that the security solutions for IoT devices should be computationally efficient. To address all these requirements, in this article, we present a lightweight and privacy-preserving two-factor authentication scheme for IoT devices, where physically uncloneable functions (PUFs) have been considered as one of the authentication factors. Security and performance analysis show that our proposed scheme is not only robust against several attacks, but also very efficient in terms of computational efficiently.Keywords
Funding Information
- Ministry of Education, Singapore (R-263-000-C13-112)
This publication has 13 references indexed in Scilit:
- Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security ModelIEEE Transactions on Information Forensics and Security, 2017
- Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and ApplicationsPublished by Springer Science and Business Media LLC ,2016
- One time password authentication scheme based on elliptic curves for Internet of Things (IoT)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Physical Unclonable Functions and Applications: A TutorialProceedings of the IEEE, 2014
- Two-phase authentication protocol for wireless sensor networks in distributed IoT applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- PUF-enhanced offline RFID security and privacyJournal of Network and Computer Applications, 2012
- PUF Based Scalable Private RFID AuthenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- Physical Unclonable Functions and Public-Key Crypto for FPGA IP ProtectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A logic of authenticationACM Transactions on Computer Systems, 1990