Next Article in Journal
Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets
Previous Article in Journal
Agustín de Betancourt’s Double-Acting Steam Engine: Geometric Modeling and Virtual Reconstruction
Article Menu
Issue 8 (August) cover image

Export Article

Open AccessArticle
Symmetry 2018, 10(8), 352; https://doi.org/10.3390/sym10080352

PUF Based Authentication Protocol for IoT

Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussel, Belgium
Received: 11 July 2018 / Revised: 9 August 2018 / Accepted: 11 August 2018 / Published: 20 August 2018
Full-Text   |   PDF [506 KB, uploaded 20 August 2018]   |  

Abstract

Key agreement between two constrained Internet of Things (IoT) devices that have not met each other is an essential feature to provide in order to establish trust among its users. Physical Unclonable Functions (PUFs) on a device represent a low cost primitive exploiting the unique random patterns in the device and have been already applied in a multitude of applications for secure key generation and key agreement in order to avoid an attacker to take over the identity of a tampered device, whose key material has been extracted. This paper shows that the key agreement scheme of a recently proposed PUF based protocol, presented by Chatterjee et al., for Internet of Things (IoT) is vulnerable for man-in-the-middle, impersonation, and replay attacks in the Yao–Dolev security model. We propose an alternative scheme, which is able to solve these issues and can provide in addition a more efficient key agreement and subsequently a communication phase between two IoT devices connected to the same authentication server. The scheme also offers identity based authentication and repudiation, when only using elliptic curve multiplications and additions, instead of the compute intensive pairing operations. View Full-Text
Keywords: physical unclonable function; authentication; elliptic curve cryptography; internet of things physical unclonable function; authentication; elliptic curve cryptography; internet of things
Figures

Graphical abstract

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Braeken, A. PUF Based Authentication Protocol for IoT. Symmetry 2018, 10, 352.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top