Suppr超能文献

基于物理不可克隆函数的物联网设备认证与密钥交换协议的安全性

On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices.

作者信息

Sun Da-Zhi, Gao Yi-Na, Tian Yangguang

机构信息

Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin 300350, China.

Department of Computer Science, University of Surrey, Surrey GU2 7XH, UK.

出版信息

Sensors (Basel). 2023 Jul 20;23(14):6559. doi: 10.3390/s23146559.

Abstract

Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.

摘要

最近,罗伊等人提出了一种基于物理不可克隆函数(PUF)的物联网(IoT)设备认证和密钥交换协议。该PUF协议效率很高,因为它将节点到节点(N2N)认证和节点到服务器(N2S)认证集成到了一个独立协议中。因此,在本文中,我们在内部人员攻击的假设下研究了PUF协议的安全性。我们的密码分析结果如下:(1)一个合法但恶意的物联网节点可以在N2N认证和N2S认证中监控服务器与任何其他物联网节点之间的安全通信。(2)一个合法但恶意的物联网节点能够分别在N2N认证中冒充目标物联网节点欺骗服务器和任何其他物联网节点,在N2S认证中欺骗服务器。(3)一个合法但恶意的物联网节点可以在N2N认证和N2S认证中伪装成服务器欺骗任何其他目标物联网节点。据我们所知,我们的工作首次对PUF协议进行了重要的具体安全性分析。此外,我们使用安全协议自动验证工具Scyther来确认在PUF协议中发现的弱点。我们最后考虑如何防止PUF协议中的弱点。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/8bd0/10383870/f76a61eeb87b/sensors-23-06559-g001.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验