A lightweight key renewal scheme based authentication protocol with configurable RO PUF for clustered sensor networks

نویسندگان

چکیده

In clustered sensor networks, an adversary can easily capture and damage a member node. Therefore, it is important to detect the compromised nodes renew keys of all other nodes. Although many key renewal schemes have been proposed, detection still difficult achieve. Furthermore, due resources limitation, conventional encryption authentication protocols are impractical when we take power consumption resource usage into consideration. this paper, lightweight energy-efficient protocol scheme for networks was in which configurable ring oscillator (CRO) physical unclonable function (PUF) adopted enhance security. Typical CRO PUFs, including multiplexer (MUX) based PUF XOR gate PUF, analyzed compared. The proposed implemented evaluated on Zynq 7000 series SoC FPGAs. results indicate that structure cost efficient secure against major attacks networks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight Key Renewals for Clustered Sensor Networks

In sensor networks, sensors are likely to be captured by attackers because they are usually deployed in an unprotected or even a hostile environment. If an adversarial compromises a sensor, he/she uses the keys from the compromised sensor to uncover the keys of others sensors. Therefore, it is very important to renew the keys of sensors in a proactive or reactive manner. Even though many group ...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol

We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...

متن کامل

PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Microelectronics Journal

سال: 2021

ISSN: ['1879-2391', '0026-2692']

DOI: https://doi.org/10.1016/j.mejo.2021.105265