Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
نویسندگان
چکیده
The service of authentication constitutes the spine all security properties. It is phase where entities prove their identities to each other and generally establish derive cryptographic keys provide confidentiality, data integrity, non-repudiation, availability. Due heterogeneity particular requirements IoT (Internet Things), developing secure, low-cost, lightweight protocols has become a serious challenge. This excited research community design develop new that meet requirements. An interesting hardware technology, called PUFs (Physical Unclonable Functions), been subject many subsequent publications on lightweight, secure-by-design protocols. turned our attention investigate most recent PUF-based for IoT. In this article, we review these We first necessary background PUFs, types, related attacks. Also, discuss how are used authentication. Then, analyze identify report common issues flaws, as well recommendations future protocol designers.
منابع مشابه
Converse PUF-Based Authentication
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In th...
متن کاملSecurity Analysis of a PUF based RFID Authentication Protocol
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital threats
سال: 2022
ISSN: ['2692-1626', '2576-5337']
DOI: https://doi.org/10.1145/3487060