Abstract

As security has always been an afterthought of innovation, the security of IoT (Internet of Things), in general, and authentication, in particular, has become a serious research challenge. Although many authentication protocols have been proposed in the literature during the past decade, most of them do not fulfill the IoT security and performance requirements. Furthermore, only a very small number of these protocols can be used in Thing-to-Thing (T2T) architectures, where Things autonomously authenticate each other without involving any human intervention. In this paper, we propose a novel lightweight T2T mutual authentication protocol (T2T-MAP) using PUFs (Physical Unclonable Functions). The protocol employs PUFs technology to allow each Thing to uniquely identify and authenticate itself in an IoT infrastructure by using the physical randomness of its circuitry. We design the protocol and perform a security analysis to show that it is secure against known attacks. Also, we prove the security of the protocol using a security protocol prover. Finally, we implement a prototype of the protocol on resource-constrained devices and then conduct a performance analysis to demonstrate that the protocol allows fast authentication, reasonable communication overhead, and low energy consumption.

Highlights

  • IoT (Internet of Things) allows the interconnection of an exponentially increasing number of heterogeneous devices, called Things

  • We briefly review some recent PUF-based authentication protocols

  • THE PROPOSED PROTOCOL (T2T-MAP) we propose T2T mutual authentication protocol (T2T-MAP), a secure lightweight T2T PUF-based authentication protocol for IoT (Internet of Things)

Read more

Summary

Introduction

IoT (Internet of Things) allows the interconnection of an exponentially increasing number of heterogeneous devices, called Things. This has allowed the emergence of various smart applications and new ubiquitous Internet services in various fields This important evolution of the Internet to a heterogeneous infrastructure has invited cybercriminals to exploit the new infrastructure and mount distributed and devastating cyberattacks at large-scale as well as at local-scale [1]–[7]. These cyberattacks have demonstrated to the community how catastrophic and diversified cybercrimes could be in a world where everything is perceived as a connected computer [8]. More research is required to develop new authentication protocols that are secure and reliable by-design and conform to IoT security and performance requirements

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.