浏览全部资源
扫码关注微信
1. 国防科技大学计算机学院,湖南 长沙 410000
2. 信息工程大学,河南 洛阳 471003
[ "王振宇(1995- ),男,湖南长沙人,国防科技大学博士生,主要研究方向为硬件安全、物联网协议、安全认证协议、物理不可克隆函数等" ]
[ "郭阳(1971- ),男,湖南长沙人,博士,国防科技大学研究员、博士生导师,主要研究方向为微处理设计、嵌入式系统设计等" ]
[ "李少青(1963- ),男,陕西西安人,国防科技大学研究员、博士生导师,主要研究方向为硬件安全、硬件木马检测、IP 核安全检测等" ]
[ "侯申(1983- ),男,河南洛阳人,博士,信息工程大学讲师,主要研究方向为物理不可克隆函数设计、微处理器设计、物联网安全等" ]
[ "邓丁(1993- ),男,湖南长沙人,博士,国防科技大学讲师,主要研究方向为硬件木马、物理不可克隆函数设计、高性能处理器扫描测试等" ]
网络出版日期:2022-06,
纸质出版日期:2022-07-25
移动端阅览
王振宇, 郭阳, 李少青, 等. 面向轻量级物联网设备的高效匿名身份认证协议设计[J]. 通信学报, 2022,43(7):49-61.
Zhenyu WANG, Yang GUO, Shaoqing LI, et al. Design of efficient anonymous identity authentication protocol for lightweight IoT devices[J]. Journal on communications, 2022, 43(7): 49-61.
王振宇, 郭阳, 李少青, 等. 面向轻量级物联网设备的高效匿名身份认证协议设计[J]. 通信学报, 2022,43(7):49-61. DOI: 10.11959/j.issn.1000-436x.2022125.
Zhenyu WANG, Yang GUO, Shaoqing LI, et al. Design of efficient anonymous identity authentication protocol for lightweight IoT devices[J]. Journal on communications, 2022, 43(7): 49-61. DOI: 10.11959/j.issn.1000-436x.2022125.
针对现有方案中复杂安全原语不适合资源受限的物联网设备的问题,基于物理不可克隆函数(PUF)为物联网设备设计了一种轻量级高效匿名身份认证协议。通过形式化安全模型和ProVerif协议分析工具,证明该协议满足信息传输机密性、完整性、不可追踪和前向/后向保密等13种安全属性。与近几年认证方案的性能对比分析表明,该协议在设备端与服务器端的计算开销分别为0.468 ms和0.072 ms,设备存储开销与通信开销分别为256 bit和896 bit,高度适用于资源受限的轻量级物联网设备。
Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices
a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool
it was proved that the protocol satisfies 13 security properties such as information confidentiality
integrity
un-traceability
and forward/backward secrecy.Compared with existing relevant protocols
the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively
and the device storage and communication overheads are 256 bit and 896 bit respectively
which is highly suitable for lightweight IoT devices with limited resources.
HAGHI K M , MADANIPOUR M , NIKRAVAN M , et al . A systematic review of IoT in healthcare:applications,techniques,and trends [J ] . Journal of Network and Computer Applications , 2021 , 192 : 103 - 164 .
SHAFIQUE K , KHAWAJA B A , SABIR F , et al . Internet of things (IoT) for next-generation smart systems:a review of current challenges,future trends and prospects for emerging 5G-IoT Scenarios [J ] . IEEE Access , 2020 , 8 : 23022 - 23040 .
BEDI G , VENAYAGAMOORTHY G K , SINGH R . Review of Internet of things (IoT) in electric power and energy systems [J ] . IEEE Internet of Things Journal , 2018 , 5 ( 2 ): 847 - 870 .
毅宇 , 周威 , 赵尚儒 , 等 . 物联网安全研究综述:威胁、检测与防御 [J ] . 通信学报 , 2021 , 42 ( 8 ): 188 - 205 .
YANG Y Y , ZHOU W , ZHAO S R , et al . Survey of IoT security research:threats,detection and defense [J ] . Journal on Communications , 2021 , 42 ( 8 ): 188 - 205 .
IBRAHIM A , DALKILIC G . Review of different classes of RFID authentication protocols [J ] . Wireless Networks , 2019 , 25 ( 3 ): 961 - 974 .
LI W , LI X L , GAO J T , et al . Design of secure authenticated key management protocol for cloud computing environments [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 18 ( 3 ): 1276 - 1290 .
IU S M , WANG D , XU G A , et al . Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices [J ] . IEEE Transactions on Dependable and Secure Computing , 2022 , 19 ( 2 ): 1338 - 1351 .
AO Y S , AL-SARAWI S F , ABBOTT D . Physical unclonable functions [J ] . Nature Electronics , 2020 , 3 ( 2 ): 81 - 91 .
ELVAUX J . Machine-learning attacks on PolyPUFs,OB-PUFs,RPUFs,LHS-PUFs,and PUF-FSMs [J ] . IEEE Transactions on Information Forensics and Security , 2019 , 14 ( 8 ): 2043 - 2058 .
叶靖 , 胡瑜 , 李晓维 . 非确定性仲裁型物理不可克隆函数设计 [J ] . 计算机辅助设计与图形学学报 , 2017 , 29 ( 1 ): 166 - 171 .
YE J , HU Y , LI X W . Nondeterministic logic based arbiter physical unclonable function [J ] . Journal of Computer-Aided Design & Computer Graphics , 2017 , 29 ( 1 ): 166 - 171 .
PRADA-DELGADO M A , VÁZQUEZ-REYES A , BATURONE I . Trustworthy firmware update for Internet-of-thing devices using physical unclonable functions [C ] // Proceedings of 2017 Global Internet of Things Summit (GIoTS) . Piscataway:IEEE Press , 2017 : 1 - 5 .
MALL P , AMIN R , DAS A K , et al . PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:a comprehensive survey [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 11 ): 8205 - 8228 .
GU C Y , CHANG C H , LIU W Q , et al . A modeling attack resistant deception technique for securing lightweight-PUF-based authentication [J ] . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , 2021 , 40 ( 6 ): 1183 - 1196 .
GOPE P , LEE J , QUEK T Q S . Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions [J ] . IEEE Transactions on Information Forensics and Security , 2018 , 13 ( 11 ): 2831 - 2843 .
HOSSAIN M , NOOR S , HASAN R . HSC-IoT:a hardware and software co-verification based authentication scheme for Internet of things [C ] // Proceedings of 2017 5th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering (MobileCloud) . Piscataway:IEEE Press , 2017 : 109 - 116 .
AKGÜN M , ÇAĞLAYAN M U , . Providing destructive privacy and scalability in RFID systems using PUFs [J ] . Ad Hoc Networks , 2015 , 32 : 32 - 42 .
ZHOU L , LI X , YEH K H , et al . Lightweight IoT-based authentication scheme in cloud computing circumstance [J ] . Future Generation Computer Systems , 2019 , 91 : 244 - 251 .
MORIYAMA D , MATSUO S , YUNG M . PUF-based RFID authentication secure and private under memory leakage [R ] . 2014 .
PATIL A S , HAMZA R , HASSAN A , et al . Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts [J ] . Computers & Security , 2020 ,97:101958.
XIE Q , HU B , TAN X , et al . Robust anonymous two-factor authentication scheme for roaming service in global mobility network [J ] . Wireless Personal Communications , 2014 , 74 ( 2 ): 601 - 614 .
DOLEV D , YAO A . On the security of public key protocols [J ] . IEEE Transactions on Information Theory , 1983 , 29 ( 2 ): 198 - 208 .
WANG W Z , CHEN Q , YIN Z M , et al . Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 11 ): 8883 - 8891 .
BIAN W X , GOPE P , CHENG Y Q , et al . Bio-AKA:an efficient fingerprint based two factor user authentication and key agreement scheme [J ] . Future Generation Computer Systems , 2020 , 109 : 45 - 55 .
QURESHI M A , MUNIR A . PUF-RAKE:a PUF-based robust and lightweight authentication and key establishment protocol [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , PP ( 99 ): 1 .
黄可可 , 刘亚丽 , 殷新春 . 一种基于PUF的超轻量级RFID标签所有权转移协议 [J ] . 密码学报 , 2020 , 7 ( 1 ): 115 - 133 .
HUANG K K , LIU Y L , YIN X C . A PUF-based ultra-lightweight ownership transfer protocol for low-cost RFID tags [J ] . Journal of Cryptologic Research , 2020 , 7 ( 1 ): 115 - 133 .
FEISTEL H , NOTZ W A , SMITH J L . Some cryptographic techniques for machine-to-machine data communications [J ] . Proceedings of the IEEE , 1975 , 63 ( 11 ): 1545 - 1554 .
SCHNEIER B . Applied cryptography:protocols,algorithms,and source code in C [M ] . New York : Wiley , 1996 .
HOU S , DENG D , WANG Z Y , et al . A dynamically configurable LFSR-based PUF design against machine learning attacks [J ] . CCF Transactions on High Performance Computing , 2021 , 3 ( 1 ): 31 - 56 .
AYSU A , GULCAN E , MORIYAMA D . End-to-end design of a PUF-based privacy preserving authentication protocol [C ] // Cryptographic Hardware and Embedded Systems . Berlin:Springer , 2015 : 556 - 576 .
0
浏览量
1210
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构