T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT

نویسندگان

چکیده

As security has always been an afterthought of innovation, the IoT (Internet Things), in general, and authentication, particular, become a serious research challenge. Although many authentication protocols have proposed literature during past decade, most them do not fulfill performance requirements. Furthermore, only very small number these can be used Thing-to-Thing (T2T) architectures, where Things autonomously authenticate each other without involving any human intervention. In this paper, we propose novel lightweight T2T mutual protocol (T2T-MAP) using PUFs (Physical Unclonable Functions). The employs technology to allow Thing uniquely identify itself infrastructure by physical randomness its circuitry. We design perform analysis show that it is secure against known attacks. Also, prove prover. Finally, implement prototype on resource-constrained devices then conduct demonstrate allows fast reasonable communication overhead, low energy consumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...

متن کامل

Application of Internet of Thing (IoT) in Health Industry

Introduction: Today, new technologies have been used in order to increase competitiveness and increase the quality of services in organizations providing health services. The purpose of this study is to investigate the applications of IoT technology in the field of health. Methods and Materials: This review study was conducted in 1400. In this study, PubMed and Scopus databases and English art...

متن کامل

PUF-HB: A Tamper-Resilient HB Based Authentication Protocol

We propose a light-weight protocol for authentication of low-power devices. Our construc-tion PUF-HB merges the positive qualities of two families of authentication functions. PUFrepresents physically unclonable functions and fulfills the purpose of providing low-cost tamper-resilient challenge-response authentication. On the other hand, the Hopper Blum (HB) functionprovides...

متن کامل

Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol

We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3117444