Next Article in Journal
Analysis of Influence of Segmentation, Features, and Classification in sEMG Processing: A Case Study of Recognition of Brazilian Sign Language Alphabet
Next Article in Special Issue
Towards a Safer Internet of Things—A Survey of IoT Vulnerability Data Sources
Previous Article in Journal
Characterization and Monitoring of Titanium Bone Implants with Impedance Spectroscopy
Previous Article in Special Issue
A Novel Location Privacy-Preserving Approach Based on Blockchain
Article

Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices

TSYS School of Computer Science, Columbus State University, Columbus, GA 31907, USA
*
Authors to whom correspondence should be addressed.
Sensors 2020, 20(16), 4361; https://doi.org/10.3390/s20164361
Received: 22 April 2020 / Revised: 27 July 2020 / Accepted: 3 August 2020 / Published: 5 August 2020
(This article belongs to the Special Issue Security and Privacy Techniques in IoT Environment)
Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments. View Full-Text
Keywords: physical unclonable functions; arbiter; HMAC; SRAM; IoT device authentication; invasive attack physical unclonable functions; arbiter; HMAC; SRAM; IoT device authentication; invasive attack
Show Figures

Figure 1

MDPI and ACS Style

Mostafa, A.; Lee, S.J.; Peker, Y.K. Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices. Sensors 2020, 20, 4361. https://doi.org/10.3390/s20164361

AMA Style

Mostafa A, Lee SJ, Peker YK. Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices. Sensors. 2020; 20(16):4361. https://doi.org/10.3390/s20164361

Chicago/Turabian Style

Mostafa, Ahmed, Suk J. Lee, and Yesem K. Peker. 2020. "Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices" Sensors 20, no. 16: 4361. https://doi.org/10.3390/s20164361

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop