You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Editor’s Choice
  • Article
  • Open Access

15 August 2024

Secure PUF-Based Authentication Systems

and
1
Division of Electrical Engineering and Computer Science, Graduate School of Natural Science and Technology, Kanazawa University, Kanazawa 920-1192, Ishikawa, Japan
2
Institute of Science and Engineering, Kanazawa University, Kanazawa 920-1192, Ishikawa, Japan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Communication, Security, and Privacy in IoT

Abstract

The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT’s unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission. We show a new protocol that leverages PUFs for device authentication by utilizing Paillier homomorphic encryption or the plaintext equality test to enhance security. Our approach involves encrypting both the challenge–response pairs (CRPs) using Paillier homomorphic encryption scheme or ElGamal encryption for plaintext equality testing scheme. The verifier does not need access to the plaintext CRPs to ensure that sensitive data remain encrypted at all times and our approach reduces the computational load on IoT devices. The encryption ensures that neither the challenge nor the response can be deciphered by potential adversaries who obtain them during the transmission. The homomorphic property of the Paillier scheme or plaintext equality testing scheme allows a verifier to verify device authenticity without decrypting the CRPs, preserving privacy and reducing the computational load on IoT devices. Such an approach to encrypting both elements of the CRP provides resistance against CRP disclosure, machine learning attacks, and impersonation attacks. We validate the scheme through security analysis against various attacks and evaluate its performance by analyzing the computational overhead and the communication overhead. Comparison of average computational and communication time demonstrates Paillier scheme achieves approximately 99% reduction while the plaintext equality test achieves approximately 94% reduction between them.

1. Introduction

IoT devices are becoming increasingly popular across various organizations, including in smart homes, healthcare, and offices. However, their widespread use has led to significant security concerns. These devices have risks of impersonation, tampering, and data loss, primarily due to their reliance on wireless connectivity and Internet access, which exposes them to a wide range of cyber threats. Key issues include ensuring proper authentication, authorization, data integrity, confidentiality, and privacy. Addressing these challenges is crucial for leveraging the full potential of IoT technologies and enhancing their security and performance [1]. IoT devices often have limited processing power, a small memory, and low energy supplies, making it hard to use standard authentication methods that need more resources. Traditional security methods, like using public or private key systems, keep secret keys or important data in the temporary memory of devices. This configuration makes them susceptible to physical threats such as invasive, semi-invasive, or side-channel attacks [2]. An attacker could potentially extract the secret key or replicate the entire IoT system, using this to impersonate the device. Therefore, physical attacks pose a significant risk, especially since IoT devices are commonly placed in public spaces where they are easily accessible. To address these issues, PUFs provide a hardware-based security solution through a challenge–response mechanism, generating a unique response to each challenge. This feature makes them a promising tool for enhancing IoT device security. Although physically unclonable functions (PUFs) enhance IoT device authentication—which is vital for safeguarding against unauthorized network access—they remain vulnerable to security threats. Devices and networks still face risks from physical attacks, where attackers can remotely eavesdrop or tamper with network connections [3]. Thus, it is essential to design security measures that are efficient and robust against a range of attacks. The challenges associated with IoT security have spurred the development of a lightweight authentication technique fixed to the unique needs and limitations of these devices. Any authentication method deployed must be robust, computationally efficient, and resilient against physical intrusions. PUFs [2] have emerged as a favored approach for enhancing security affordably. This makes them an attractive choice for creating more secure and affordable authentication methods for IoT environments. However, current PUF-based authentication systems still face significant challenges, including vulnerability to machine learning attacks, CRP disclosure, and the need for secure data transmission. To address these challenges, we propose a novel secure PUF-based authentication protocol that leverages Paillier homomorphic encryption or plaintext equality testing to enhance security. The necessity for the new scheme arises from the current limitations and vulnerabilities of existing PUF-based authentication systems. We validate the scheme through comprehensive security analysis against various attacks and evaluate its performance by analyzing the computational and communication overhead. By addressing these critical security challenges, our protocol aims to provide a robust, efficient, and secure authentication solution for IoT devices, enabling safer and more reliable IoT applications.

1.1. Contributions

The integration of the Paillier homomorphic encryption or plaintext equality test with physically unclonable functions-based device authentication in IoT systems significantly contributes to enhancing the security, privacy, and overall integrity of the IoT system. To the best of the authors’ knowledge, there is no such scheme combining PUFs with homomorphic encryption or plaintext equality test, even though the construction looks straightforward. The combination of the unique hardware-based security features of PUFs and data protection capabilities of homomorphic encryption and plaintext equality test addresses several critical challenges in IoT security.
The contributions of this paper are summarized as follows:
  • In the authentication process by a PUF IoT device to a gateway router, the correctness of PUF responses can be verified by the gateway router in an encrypted form without any decryption. Processing data in an encrypted form minimizes the risks of data breaches, enhancing trust.
  • Under this construction, the resistance against CRP disclosure, machine learning attack, and impersonation attack is improved over the scheme using plaintext CRPs.
  • Integrating the PUFs with Paillier encryption or plaintext equality test for device authentication ensures data confidentiality and protection against unauthorized access or tampering.
  • Eliminating the storage of secrets on the IoT devices makes the protocol secure against physical attacks.
  • The performance and security of the constructed scheme are evaluated to validate the effectiveness of the construction.

1.2. Paper Organization

Our paper is organized as follows. First, our contribution is introduced in Section 1. The preliminaries are expressed in Section 2. The related work is described in Section 3. The secure PUF-based authentication protocol is explained in Section 4. Section 5 and Section 6 present a security consideration of the scheme. Then, we discuss the performance evaluation in Section 7 and a conclusion is drawn in Section 8.

2. Preliminaries

This section introduces the preliminaries’ background describing the characteristics of physically unclonable function, homomorphic encryption, Paillier encryption, ElGamal encryption and its plaintext equality test using trapdoor.

2.1. Physically Unclonable Function

Physically unclonable functions PUFs are becoming essential in the hardware security environment. PUFs leverage the natural and small inconsistencies that arise during the semiconductor manufacturing process to create distinct, device-specific signatures or responses. These inconsistencies are unpredictable and nearly impossible to duplicate, positioning PUFs as a choice for authentication, identification, and key generation within secure systems. The fundamental concept of PUFs revolves around their capability to produce a unique response to a specific challenge, determined by the individual physical traits of the device. This challenge–response behavior functions similarly to a cryptographic hash function but is rooted in the hardware’s physical attributes [2]. In IoT systems, PUFs offer a robust mechanism for device authentication and secure key storage without the need for non-volatile memory to store cryptographic keys. This capability is particularly advantageous for IoT devices, which often operate in unsecured environments and are susceptible to physical tampering. By leveraging the unique physical characteristics of devices, PUFs offer a powerful tool for authentication, key generation, and security that is deeply rooted in the hardware itself. One critical function is device authentication, where PUFs ensure that only authorized devices can access networks or services, thwarting impersonation attacks.
Figure 1 describes the workflow of the PUF-based authentication protocol in an IoT environment. The verifier initiates the authentication process by generating a challenge C and sending it to the IoT device equipped with a PUF. The PUF device receives the challenge C and uses its unique physical characteristics to generate a corresponding response R , which is then sent back to the verifier. The database stores the challenge–response pairs (CRPs) consisting of challenges C and their corresponding responses R. The verifier retrieves the response R from the database and compares it with R . If they match, the device is authenticated.
Figure 1. Overview of PUF-based authentication protocol in IoT.
Moreover, leveraging PUFs comes with challenges. Environmental factors such as temperature fluctuations and aging can affect PUF responses, necessitating error correction mechanisms and stable operating conditions to maintain consistency. Sophisticated attackers may employ modeling attacks, attempting to build mathematical models of PUF behavior based on observed challenge–response pairs [4]. To mitigate this risk, the careful management of these pairs and potentially limiting their usage is crucial for robust security. As IoT networks continue to expand and face increasingly sophisticated threats, PUFs stand out as a critical technology in the development of secure, trustworthy IoT systems.
In a PUF experiment, the observed response values can be organized in several ways, highlighting three key aspects and also describing the following [2]:
  • Responses obtained from various PUF devices;
  • Responses generated by the same PUF device in reaction to different challenges;
  • Responses produced by the same PUF device to the same challenge, but during separate evaluations.

2.2. Typical PUF-Based Authentication Protocol

A challenge–response protocol using PUFs consists of two processes. This process ensures secure authentication of entities based on their unique PUF characteristics. The first one is the enrollment process that is shown in Figure 2.
Figure 2. Enrollment process of typical authentication protocol.
In this process, the verifier records the identity of each entity by collecting multiple challenge–response pairs from the PUF of each entity. Various challenges are applied to the PUF, and the corresponding responses are recorded. The collected CRPs are then stored in verifier database, with each entity assigned a unique identifier. The verifier provides each entity with their unique I D for future identification during the authentication process. Each entity can be recognized based on its unique PUF generated responses.
In the authentication process shown in Figure 3, the entity prover requests authentication by presenting its unique I D to the verifier. The verifier selects the available CRPs associated with the provided I D from the database and randomly selects a challenge. This selected challenge is sent to the prover, who then uses the PUF to generate a response based on the received challenge. The generated response is sent back to the verifier, who compares it with the corresponding response recorded during the enrollment phase. The verifier calculates the distance between the recorded response and the received response for authentication. If the check is successful, the prover is authenticated. The comparison process is vital as it ensures that only genuine responses from the correct PUF can be verified successfully, and it prevents unauthorized access and ensures the reliability of the authentication mechanism.
Figure 3. Authentication process of typical authentication protocol.

2.3. Encryption Schemes

2.3.1. Homomorphic Encryption

Homomorphic encryption allows computations to be performed on ciphertexts, generating an encrypted result, in decryption, which matches the result of operations performed on the plaintexts which is useful for secure data processing and privacy-preserving computations. The outcome of such computations remains encrypted, ensuring that the process yields the same result as if it had been conducted on unencrypted data. This form of encryption is primarily used to safeguard data privacy when outsourcing data storage and computation, allowing operations on data while keeping these secure. In highly regulated industries like defense and healthcare, homomorphic encryption offers a solution to overcome privacy barriers when sharing data [5,6].
The three main categories of homomorphic encryption include the following:
  • Partially homomorphic encryption—PHE;
  • Somewhat homomorphic encryption—SHE;
  • Fully homomorphic encryption—FHE.
Each of these have varying degrees of computational capabilities on encrypted data.
Additive homomorphism, when given two plaintexts m 1 and m 2 , and their corresponding ciphertexts E ( m 1 ) and E ( m 2 ) under the same public key, will allow [7]:
E ( m 1 , r 1 ) E ( m 2 , r 2 ) = E ( m 1 + m 2 , r 1 × r 2 )
where m 1 and m 2 are messages, and r 1 and r 2 are random numbers associated with the encryption process. This property allows anyone possessing ciphertext to perform an operation between plaintexts, such as summing encrypted values without decrypting them. The security guarantees that, without the corresponding private key, deriving any information about the plaintext from its ciphertext is computationally infeasible. The cryptosystem employs asymmetric key pairs for encryption and decryption, enhancing data security by ensuring that only the holders of the private key can decrypt the information.

2.3.2. Paillier Encryption Scheme

The Paillier cryptosystem [8] is a public-key cryptosystem with the distinctive feature of additive homomorphic encryption. It relies on the mathematical concept of composite degree residuality classes.
  • Key generation: The key generation process involves creating both a public key for encryption and a private key for decryption. It chooses two large prime numbers p and q such that gcd ( p q , ( p 1 ) ( q 1 ) ) = 1 . Then, in the computing process, n = p q and λ = lcm ( p 1 , q 1 ) where l c m denotes the least common multiple. It selects random integer g where g Z n 2 * and compute μ as the modular inverse of L ( g λ mod n 2 ) mod n , where L ( u ) = u 1 n . ( n , g ) is public encryption key, and ( p , q ) ( o r ( λ , μ ) ) is the private decryption key.
  • Encryption process: To encrypt a plaintext message m Z n , it chooses a random number r Z n * and computes the ciphertext c as c = E ( m , r ) = g m · r n mod n 2 .
  • Decryption process: To decrypt a ciphertext c, it computes u = c λ mod n 2 . Then, it calculates the plaintext message m as m = L ( u ) μ mod n = L ( c λ mod n 2 ) μ mod n .
The Paillier scheme finds extensive applications in fields requiring privacy-preserving operations on encrypted data, such as secure voting systems, secure data aggregation in cloud computing [9], and financial privacy, by allowing for encrypted transactions to be aggregated and analyzed anonymously.

2.3.3. ElGamal Encryption and Its Plaintext Equality Test Using Trapdoor

ElGamal encryption is a public-key cryptosystem based on the discrete logarithm problem, which inherently incorporates a trapdoor function. The ElGamal encryption plays a crucial role in its security and functionality [10,11]. The properties of ElGamal encryption in cryptographic communications include the following:
  • Setup and key generation: ElGamal encryption begins with the selection of a large prime number p and a generator g of the multiplicative group < g > of integers modulo p. The private key x is chosen randomly from the set Z q where q = | < g > | and the public key h is computed as h = g x mod p . The values p, g and h are publicly shared, while x remains secret.
  • Encryption process: To encrypt a message m, where m is an integer less than p, the sender selects a random integer k from Z q , and computes the ciphertext as a pair ( c 1 , c 2 ) where c 1 = g k mod p , c 2 = m × h k mod p .
  • Decryption process: To decrypt the ciphertext ( c 1 , c 2 ) , the receiver uses the private key x to compute s = c 1 x mod p and obtains m = c 2 × s 1 mod p .
  • Plaintext equality test using trapdoor: The paper [10] shows the plaintext equality test of ElGamal ciphertexts using bilinear pairings and a trapdoor which makes efficient and secure equality checks.
For the bilinear mapping, a bilinear map e : G 1 × G 2 G T is a function with the following properties:
  • Bilinearity: For all ( u , v ^ , a , b ) G 1 × G 2 × Z p 2 , the map satisfies e ( u a , v ^ b ) = e ( u , v ^ ) a b
  • Non-degeneracy: e ( g , g ^ ) 1 , where g and g ^ are the generators of groups G 1 and G 2 , respectively.
  • Efficient computability: The map e can be computed efficiently.
Here, G 1 = g , G 2 = g ^ , and g ^ G 2 .
For the trapdoor generation, it is shown as
t k = ( r ^ , t ^ = r ^ x ) G 2 2 , where r ^ G 2 .
To compare the two ciphertexts with plaintext equality testing that are as R = ( R 1 , R 2 ) and R = ( R 1 , R 2 ) , encrypt the same plaintext without decrypting them using the following equation involving pairings:
e ( R 2 , r ^ ) · e ( R 1 , t ^ ) 1 = e ( R 2 , r ^ ) · e ( R 1 , t ^ ) 1
where R 1 , R 2 , R 1 , and R 2 are elements derived from the ciphertexts. The use of trapdoor elements r ^ and t ^ derived from the private key x ensures that the comparison can be performed without revealing the actual plaintexts, maintaining the confidentiality and integrity of the encrypted data.

4. Scheme Overview

4.1. IoT Network Architecture

There are four entities of our scheme in Figure 4, which are as follows.
Figure 4. System model.
  • PUF IoT devices—D: It utilizes physically unclonable functions to generate unique and unpredictable responses based on its inherent physical characteristics. The device acts as the client in the authentication protocol.
  • Gateway router—GR: It is responsible for initiating challenges, processing responses, and facilitating secure communication. It can also serve as the first layer of authentication and encryption/decryption. The GR can perform initial checks on the encrypted data received from the PUF-IoT devices. Utilizing the properties of Paillier homomorphic encryption or plaintext equality test, the gateway router forwards and retrieves encrypted responses without needing to decrypt them, thus maintaining data confidentiality.
  • Cloud service provider—CSP: It hosts the cloud storage of encrypted PUF challenge–response pairs CRPs for each devices. CSP provides advanced data-processing capabilities, a suitable amount of CRP storage and additional authentication services. This facilitates data retrieval but does not participate directly in the authentication process and guarantees data integrity and availability by implementing comprehensive backup and disaster recovery strategies.
  • Server—TTP: Trusted third party TTP is a critical component in the secure PUF-based authentication protocol and acts as an independent verifier. It is responsible for verifying the equality of encrypted responses from the PUF devices without decrypting the actual responses.
Our secure PUF-based authentication protocol integrates the theoretical functions to enhance the security and efficiency of the network architecture with Paillier homomorphic encryption and privacy preservation and plaintext equality testing. The Paillier encryption scheme allows mathematical operations to be performed directly on ciphertexts. Within the IoT network architecture, the verifier/gateway router can process and verify encrypted challenge–response pairs (CRPs) without the need to decrypt them. This capability preserves the privacy and confidentiality of the CRPs during transmission and verification. The Paillier encryption scheme’s homomorphic properties enable secure computations, such as addition, on encrypted data, facilitating privacy-preserving authentication. For the plaintext equality testing, it provides the ability to compare encrypted values to determine equality without decryption. This allows the verifier/gateway router to confirm whether the encrypted response R from the PUF IoT device matches with the stored encrypted response R in the database of cloud service provider.

4.2. Assumption

We set the following system assumptions:
  • PUF IoT device that is a unique resource-constrained device, and consistently generates the same response when provided with the same challenge under similar environmental conditions.
  • PUF IoT devices are secure against physical tampering up to a certain degree of sophistication by attackers.
  • PUF IoT devices communicate with the gateway router through the secure channel.
  • The server is considered a trusted third party with no resource limitations.
  • Cloud service provider securely stores CRPs and has sufficient resources.

4.3. Adversary Model

We assume that the adversary model follows the Dolev–Yao (DY) model [30], which is commonly used to demonstrate the security of cryptographic protocols.
  • Adversary can eavesdrops on public communication networks.
  • Adversary can alter the messages during the authentication process.
  • Adversary can forge messages.

4.4. Secure PUF-Based Authentication

In our authentication scheme tailored for Internet of Things environments, we leverage the unique capabilities of physically unclonable functions and the cryptographic robustness provided by two distinct schemes: Scheme-I (Appendix A) Paillier homomorphic encryption; and Scheme-II (Appendix B) plaintext equality testing using trapdoor. These two schemes are the integration of PUFs within IoT devices to generate device-specific cryptographic keys, thereby enhancing the inherent security of device authentication processes. Combining the utilization of the physical unclonable function with Paillier homomorphic encryption or plaintext equality testing facilitates secure and private communication between devices by allowing operations to be performed on encrypted data, ensuring that sensitive information remains protected throughout the authentication process. The schemes are designed to enhance security, making it suitable for resource-constrained IoT devices, and provides a detailed analysis of the protocol’s efficiency in terms of computational overhead and communication cost.
PUF devices are registered to gateway routers and the devices can be authenticated. Our protocol has three main phases: the registration phase, authentication phase, and verification phase. At first, in both the registration and authentication phases, the operation flows are similar for both two schemes. In the verification phase, we describe each scheme separately. The symbols and notations of these cryptographic properties are expressed in Table 2. Our approach not only secures the authentication process against a range of potential security threats but also ensures scalability and ease of deployment across diverse IoT systems, thereby addressing some of the most pressing security challenges in IoT networks.
Table 2. Notations used in our scheme.

4.4.1. Registration Phase

In the device registration phase for the existing PUF-based authentication protocol [26], most of them store the number of CRPs in the authentication progress to the server database. In our scheme, the gateway router does not store the number of CRPs in its database, and forwards those CRPs to the cloud service provider in order to reduce the security risk by safeguarding the confidentially of storing data and protecting server database resources. In the beginning of operations, the system initializes the public pk and private sk parameters for those two schemes. The public parameters are generated by the server in Scheme-I and gateway router in Scheme-II. Let E( · ) and D( · ) be an encryption and decryption algorithm of Scheme-I and Scheme-II. The communication between the PUF IoT device and the gateway router is conducted through a secure channel. Note that the secure channel between PUF device and the gateway router does not exist in other phases. Figure 5 illustrates the device registration phase and the steps for conducting the registration phase are listed as follows:
Figure 5. Registration phase.
  • Step 1. Challenge generation and transmission: The PUF IoT device requests registration with its device identity D i d to the gateway router. The gateway router generates and sends a random challenge C i to the PUF device.
  • Step 2. Response generation and transmission: After receiving the challenge C i from the gateway router, it computes the response R i as R i = PUF( C i ), and it encrypts that response R i with Paillier homomorphic encryption (Scheme-I) or ElGamal encryption (Scheme-II). The encrypted response R ¯ is sent back to the gateway router. The gateway router encrypts the challenge C i with the Paillier homomorphic encryption or ElGamal encryption. Then, it forwards the encrypted challenge and response with PUF device identity D i d to the cloud service provider.
  • Step 3. Secure storage of CRPs: The cloud service provider securely stores the encrypted challenge–response pair with PUF IoT device’s identity D i d , completing the registration process.
For each PUF IoT device, many encrypted CRPs are generated and stored in CSP based on the protocol shown above.

4.4.2. Authentication Phase

The authentication scheme is shown in Figure 6, where we exploit the capabilities of physically unclonable functions and the cryptographic robustness provided by Paillier homomorphic encryption or the plaintext equality testing. The processes between PUF device, gateway router, and cloud service provider are run as follows.
Figure 6. Authentication phase.
  • Step 1. Challenge retrieval and transmission: The authentication phase begins when the PUF device sends a request containing its unique device identifier D i d to the gateway router. Upon receiving the request, the gateway router contacts the cloud service provider to retrieve the encrypted challenge and response associated with the device’s identity. The cloud service provider stores encrypted challenge–response pairs for each registered device. Once the gateway router retrieves the encrypted challenge–response corresponding to the PUF device identity D i d , it decrypts the encrypted challenge. Then, it sends C i to PUF device.
  • Step 2. Response generation and transmission: The PUF device receives C i . Then, it computes the response R i , which reacts to the challenge C i . It encrypts the response and sends its encrypted response R . In this process, the PUF device encrypts the response using Paillier homomorphic encryption in Scheme-I or plaintext equality testing in Scheme-II.
  • Step 3. Retrieving the encrypted response: To verify the device without decrypting the encrypted responses, the gateway router receives the encrypted response. After that, the gateway router receives two encrypted responses, one of which one is from the PUF device and another which is from the cloud service provider. Note that step 3 of the authentication phase can be executed in the beginning of the verification phase. Finally, the PUF device waits to be verify from the gateway router.

4.4.3. Verification Phase

  • Scheme-I. Utilizing Paillier homomorphic encryption [31]: A scheme mentioned by Yehuda Lindell is designed to authenticate devices without the need to directly decrypt encrypted responses, as depicted in Figure 7, thereby preserving confidentiality and minimizing the exposure of sensitive data. In the scheme, keys and encryption operations are defined as follows.
    Figure 7. Verification phase utilizing Paillier homomorphic encryption.
  • (1) Setup: The gateway router and the server coordinate to establish the necessary cryptographic parameters:
    • Key generation: The server generates the Paillier public and private keys. Let the public key p k = ( n , g ) where n is a multiplication of large numbers p and q, and g is a generator in Z n 2 * . The private key s k = ( p , q ) or λ = ( p 1 ) ( q 1 ) is kept secret by the server.
    • Public key distribution: The public key p k is distributed to the gateway router and potentially to other devices within the network that require encryption capabilities. A cryptographic hash function h is shared between the gateway router and the server.
  • (2) Encryption phase: The responses R i and R i are, respectively, encrypted into R and R using Paillier encryption E p k ( . ) as follows:
    R = E p k ( R i ) = g R i · r n mod n 2 ,
    R = E p k ( R i ) = g R i · ( r ) n mod n 2 .
During the verification phase, the gateway router in the possession of R and R performs as follows. The gateway router computes
C T = R · R 1 mod n 2 = E p k ( R i ) · E p k ( R i ) 1 mod n 2 .
Due to the homomorphic properties of Paillier encryption, we obtain:
C T = g R i R i · r r n mod n 2 .
If R i = R i , then C T is a ciphertext of zero, i.e.,
C T = E ( 0 , r r ) = g 0 r r n mod n 2 .
The gateway router sends C T to the server.
  • (3) Proof and verification [32]: The server proves to the gateway router the correctness of Equation (2) using its secret key s k , while both the gateway router and the server take ( n , C T ) as their input.
The server possessing s k can decrypt C T and obtain 0 as its plaintext. The server can further compute v = C T n mod n where C T = g 0 r r n mod n .
The server chooses a random number r ^ Z n * , and computes
a = E ( 0 , r ^ ) = g 0 r ^ n mod n 2 .
After computing the value e = h ( a ) , the server computes z = r ^ · v e mod n 2 . Then, the server sends ( a , z ) to the router. The router checks whether C T , a , z are relatively prime to n. In that case, the router computes e = h ( a ) using a cryptographic hash function h and verifies the following Equation (3):
E ( 0 , z ) = a · C T e mod n 2 .
Since a = E ( 0 , r ^ ) = g 0 · r ^ n mod n 2 , one can derive:
a · C T e mod n 2 = g 0 · r ^ n · ( v n ) e mod n 2 = g 0 · z n mod n 2 ,
and the Equation (3) is satisfied for C T containing 0 as its plaintext.
Therefore, it confirms that the encryption of ciphertext zero without revealing any plaintext values and authenticity of the PUF device. The protocol ensures that the actual responses remain encrypted throughout the process without directly revealing any sensitive information.
  • Scheme-II. Utilizing Trapdoor for the equality test [10]: Figure 8 shows a plaintext equality test using trapdoor. This scheme does not involve any server as in Scheme-I. The key and trapdoor generation as well as the receipt of ciphertexts are performed as follows.
    Figure 8. Verification phase utilizing the plaintext equality test.
  • (1) Setup: The gateway router generates
    s k : x R Z p ,
    p k : h = g x G 1 ,
    and the gateway router further generates a trapdoor,
    t k = ( r ^ , t ^ = r ^ x ) G 2 2
    where
    r ^ R G 2 .
  • (2) Ciphertext receipt: The gateway router receives ciphertext R = ( R 1 , R 2 ) = ( g α , m h α ) from the PUF device and ciphertext R = ( R 1 , R 2 ) = ( g α , m h α ) from the cloud service provider. After receiving ciphertexts, the gateway router can start the plaintext equality test as shown below.
  • (3) Plaintext equality test: The gateway router checks the equality of
    e ( R 2 , r ^ ) · e ( R 1 , t ^ ) 1 = e ( R 2 , r ^ ) · e ( R 1 , t ^ ) 1
    where e is a bilinear map e : G 1 × G 2 G T explained in Section 2.3.3. Then, the gateway router starts knowing the equality of plaintexts if the above Equation (4) holds; otherwise, the plaintexts are not equal. The operation determines whether R’ and R are the ciphertexts of the same response value, enabling the comparison of encrypted data without the need for decryption. If the comparison confirms, the device is authenticated. Otherwise, the authentication request is declined.
The phase encapsulates the essential mechanisms ensuring that only legitimate and verified devices can communicate securely through the network, combining PUF technology and the security features of Paillier homomorphic encryption or the plaintext equality test. The proposed methodology not only safeguards against various security threats but also enhances the trustworthiness of device communications within IoT environments.

5. Informal Security Analysis

This section evaluates the security of our protocol. The security analysis assesses the protocol’s resilience against known attacks targeting IoT systems, examining its robustness in practical scenarios.
  • Eavesdropping attack: Eavesdropping is addressed in our schemes by encrypting the responses R i and R i using public key encryption. The encryption of transmitted data, including challenge–responses pairs C R P s , ensures that even if attackers intercept the data, they cannot access the plaintext responses. Using encryption schemes E ( R i ) ensures data confidentiality. This encryption protects data between the PUF device, the gateway router, and the CSP, preventing unauthorized access to sensitive information.
  • Man-in-the-middle attacks: The gateway router verifies the device using encrypted data, preventing the exposure of any decrypted data. Attackers cannot alter or forge legitimate communication. It makes it excessively difficult for attackers to inject or alter messages. Encrypted communication and verification work against this attack.
  • Denial-of-service (DoS) attack: The physical unclonability of PUF and encrypted challenge–response pairs reduce the risk of DoS attacks. Encrypted communication allows identify and discard illegitimate requests. While it may not completely prevent DoS attacks, it ensures that the authentication process remains secure against such disruptions.
  • Machine learning attack: Employing unique and unpredictable challenges C i and encrypting the responses R i make it difficult for attackers to gather sufficient CRP data to train a machine learning model. Our scheme discards used challenge–response pairs that ensures that the attackers cannot gather a sufficient amount of data are permanently removed. Utilizing Paillier encryption properties or plaintext equality text ensures further security, and reduces the opportunity for attackers to model the behavior of the PUF. Attackers cannot access or decrypt the actual responses from the secure database of the cloud service provider.
  • CRP Disclosure: Most of authentication protocols suffer from CRP disclosure attacks and then PUF impersonation [17,33,34]. Our scheme prevents it by encrypting responses R i and R i before transmission and not storing explicit CRPs in the router database. Encrypted storage and transmission ensure that CRPs are never exposed in plaintext. This approach reduces the risk of CRP exposure or unauthorized disclosure.
  • Replay attack: An attacker of replay attack intercepts communication and the intercepted data will be reused in later sessions. By performing replay attack in authentication schemes, the attacker can be verified as a legitimate party. In our scheme, the challenge and response pair will not be used in later sessions, and the use of unique and unpredictable responses R i ensures that attackers cannot predict responses to new challenges.
  • Impersonation attack: Attackers can attempt to impersonate as a legitimate device using forged PUF responses. However, the unpredictable nature of PUF-generated responses R i = P U F ( C i ) ensures that authentication data cannot be replicated or forged. Only the legitimate PUF device can produce the correct response. Even if the attacker obtains discarded CRPs, they cannot derive C i from the encrypted challenge E p k ( C i ) without the private key so that the attacker does not know which CRP corresponds to a challenge C i sent from the gateway router.
  • Physical attack: PUF is designed to be resistant to cloning and tampering due to their unique and unpredictable response characteristics. Any attempt to physically attack or replicate a PUF device will not yield useful information for generating the correct responses.
Table 3 demonstrates that the secure PUF-based authentication systems are well equipped to handle the spectrum of attacks, ensuring robust security for IoT devices.
Table 3. Attack resistance comparison related with PUF-based authentication protocols.

6. Formal Security Validation: AVISPA Simulation Tool

To perform a rigorous security proof of our protocol, we employ the SPAN+AVISPA toolset [35]. SPAN, the security protocol animator for AVISPA, is an essential tool designed specifically for CAS+ and HLPSL (high-level specification language) specifications on the SPAN-Ubuntu 10.10-light OS. By utilizing SPAN’s active intruder implementation, we are able to interactively identify and model attacks on protocols. AVISPA is instrumental in determining whether a security protocol is resistant to active and passive attacks.
In evaluating protocol security, AVISPA leverages four primary back-end components: the constraint logic-based attack searcher (CL-AtSe), the SAT-based model checker (SATMC), the on-the-fly model checker (OFMC), and the tree automata-based protocol analyzer (TA4SP) [36]. However, due to compatibility issues, AVISPA software is not compatible with the SATMC or TA4SP back-ends. And, we utilize the CL-AtSe and OFMC back-ends to assess the safety of our protocol.
We employ HLPSL to define the protocol, which is then translated into intermediate format (IF) for compatibility with AVISPA, as shown in Figure 9. The IF specifications are subsequently analyzed using model checkers such as OFMC and CL-AtSe. These analyses are conducted under the Dolev–Yao threat model, which simulates an intruder with capabilities of eavesdropping, message alteration, and message forging. Both CL-AtSe and OFMC conduct extensive searches for malicious intruders to ensure that only authorized parties can execute the specified protocol. The entities in the protocol are depicted as fundamental roles. These fundamental roles outline the initial conditions and state transitions. The messages exchanged by the entities throughout both phases are transmitted and received via the SND and RCV channels. The information about regular sessions between legitimate entities is then provided to the intrusive party by these back-ends.
Figure 9. Architecture of the AVISPA tool.

Formal Security Analysis

To ensure that our protocol is robust against replay, man-in-the-middle, impersonation attack, and CRP disclosure, we utilized the AVISPA simulation tool, which operates on the Dolev–Yao model. AVISPA uses the high-level protocol specification language (HLPSL) to validate the security of protocols through detailed role specifications.
We describe it using rule-based HLPSL, setting up various roles for the IoT device, the gateway router, and the server, as well as defining the security goals, environment, and sessions. We then check the security of paillier encryption scheme Scheme-I using the OFMC and CL-AtSe model checkers. Upon executing the HLPSL scripts within AVISPA, our protocol assessed that its evaluation is “SAFE”. This indicates that the suggested protocol exhibits strong protection against the Dolev–Yao threat model, showing resilience against such as CRP disclosure, impersonation, replay and Man-in-the-Middle (MITM) attacks.
We focused on the OFMC and CL-AtSe back-ends. Our secure PUF-based authentication protocol includes four primary roles: PUF device, gateway router, and trusted third party-server, and cloud service provider. The simulation also considers the intruder as an active participant in the protocol execution.
We conducted simulations to verify the security properties of our protocol. However, we utilized the Security Protocol Animator for AVISPA (SPAN) tool to animate the protocol’s execution and visualize the security analysis. The results are described in Figure 10 and Figure 11 which demonstrate that our protocol provides security guarantees and mitigates various known attacks.
Figure 10. Security analysis simulation result of OFMC.
Figure 11. Security analysis simulation result of CL-AtSe.
The AVISPA and SPAN tools confirm that our protocol is secure and resilient against such attacks, validating its effectiveness for secure PUF-based communications in IoT environments.

7. Performance Evaluation

7.1. Computational Overhead

In this section, the efficiency of our schemes stems from the statistical analyses for cryptographic performance. We compare the computational overhead between our schemes.
We implement our protocol using cryptographic libraries to compare between Scheme-I and Scheme-II. The experiments are conducted in a controlled software environment. To compute the communication overhead, the experiments are run on the Windows 11 machine with Intel(R) XEON(R) W-1250 CPU @3.30GHz (12 CPUs) and 32GB of Memory that are deploying on VMs with 8CPU on 8GB of Memory. The bit length of each of challenge and response is set to be 128 in parameter settings.
Table 4 describes the approximate computational time of each cryptographic operations utilized in encryption libraries such as GNU multiple precision arithmetic (GMP) [37] and pairing-based cryptography (PBC) [38] for large integer arithmetic. We employ cryptographic libraries [39] to handle bilinear pairing generation and cryptographic operations. Those schemes are executed using the parameters derived from a pairing with a 224-bit group order at the specified 112 bits security level [40] and a bit length of security parameter n = 2048 is used. To simulate the operations, we run the operation process 100 times repeatedly to analyze the average approximate time of the computational performance, which is detailed in Table 4. Table 5 shows a comparison of the computational costs between the two schemes. It should be noted that the verification phase of Scheme-I in Table 5, Table 6 and Table 7 do not count for the computations of decryption of C T as well as the n t h root of C T , i.e., the random number r r mod n inside C T .
Table 4. Approximate time (ms) of cryptographic operations.
Table 5. Comparison of computational overhead of our schemes.
Table 6. Computational overhead of cryptographic operations of our schemes.
Table 7. Computational overhead of our schemes with PUF computation.
Table 5, Table 6 and Table 7 describe the computational costs during the registration, authentication, and verification phases, highlighting the impact of cryptographic operations on the overall performance. The performance efficiency of two schemes have differences in computational costs. Scheme-II has an additional computational overhead during the verification phase to compute pairing operations, which are computationally expensive. In contrast, Scheme-I is more efficient in computational costs without pairing operations. T ( P U F ) denotes the time associated with PUF operations in Table 5. It is involved in the registration and authentication phases.
Table 6 describes the computational costs of cryptographic operations of two schemes. It does not include the time for PUF computation. According to [41], the response time of PUF computation in general is 0.02 ms. In Table 7, the computational costs with the PUF computation of two schemes is described.
We evaluate how much time increases by the cryptographic operation of our schemes in comparison with the PUF-based authentication schemes without any cryptographic operation. The computational cost of the latter authentication scheme without cryptographic operation is 0.0608 ms. It is the sum of time for the random number generation time 0.0001 ms, the PUF generation time 0.02 ms, computational time 0.0003 ms of comparing two strings in verification. The cryptographic operation in Scheme-I increases the time by 0.0012 ms, while in Scheme-II, it increases the time by 13.5375 ms compared to the PUF-based authentication schemes without any cryptographic operation. Scheme-I avoids the computationally expensive pairing operations, making it more efficient in terms of computational overhead. Scheme-II, while offering potentially stronger security due to pairing operations, incurs a higher computational cost in the verification phase. From the viewpoint of IoT device’s computational cost, Scheme-I and Scheme-II have similar encryption process. Both schemes maintain their low energy consumption on the IoT devices, ensuring that the energy efficiency is preserved.

7.2. Communication Overhead

To examine the analysis of performance evaluation, we analyze the communication performance of two schemes concerning communication costs in terms of the number of message transmissions and the total bits transmitted.
Scheme-I involves the interaction with a server during the verification phase, resulting in additional message exchanges between the gateway router and the server. The total number of message transmissions is 11 messages and 45,056 bits, which is more than the number of messages and higher in bits compared to the 2688 bits transmitted in Scheme-II. The interaction ensures that the verification of the encrypted zero is handled securely without direct decryption, enhancing security at the cost of increased communication overhead and latency.
Scheme-I eliminates the need for interaction with a server. The verification of plaintext equality is managed directly by the gateway router using plaintext equality tests using pairing operations. The absence of a server simplifies the protocol, reducing potential latency and complexity associated with involving an additional party.
The following Table 8 and Table 9 describe the communication overhead analytically for both schemes.
Table 8. Communication overhead comparison.
Table 9. Detailed communication overhead.
Scheme-I involves a more extensive communication process, with three message exchanges during the registration phase, four during the authentication phase, and another four during the verification phase, summing up to a total of 11 message exchanges and 45,056 bits transmitted. This scheme requires an interaction with the server during the verification phase, which ensures the secure handling of the encrypted zero. While this enhances the security of the protocol, it comes at the cost of increased communication overhead and latency.
On the other hand, Scheme-II is designed to be more efficient, with only two message exchanges during the authentication phases, and a single message exchange during the verification phase. This results in a total of 6 messages exchanged and 2688 bits transmitted. By avoiding server interaction, this scheme simplifies the protocol, reducing potential latency and complexity while maintaining the integrity of the verification process through the use of pairing operations. The average communication time highlighted in Scheme-II achieves approximately 94% reduction compared to Scheme-I.
Comparing the two schemes, Scheme-I prioritizes security with its additional server interaction with a higher communication overhead and increased latency. In contrast, Scheme-II achieves greater efficiency by minimizing the number of messages and bits transmitted, directly handling verification at the gateway router, reducing both latency and complexity.
To compare and compute the communication overhead with other existing schemes, Figure 12 provides a side-by-side comparison of the total cost in bits and the number of messages for the selected schemes. The total bits and number of messages for the schemes is shown in Figure 12.
Figure 12. Communication overhead [27,29].
The paper [27] demonstrates a high total communication cost of approximately 3792 bits and requires 13 messages. This scheme exhibits the highest communication overhead among the evaluated schemes.
In [29], a reduced communication overhead is shown with a total cost of around 2049 bits and 7 messages.
Our Scheme-II exhibits the lowest communication overhead with a total communication cost of approximately 1500 bits and requiring only 3 messages. This significant reduction in both metrics highlights the efficiency of Scheme-II. Scheme-I is not included in the Figure 12 because it demonstrates a significantly higher communication overhead due to the use of the server (TTP) involvement.

8. Concluding Remarks

We presented a secure PUF-based authentication system to avoid challenge–response disclosure, and to avoid key storage in Non-Volatile Memory (NVM), which mitigates potential attacks. Our PUF-based authentication scheme utilizes PUFs to enhance the security and preserve privacy more effectively. Scheme-I provides strong security guarantees through homomorphic properties and robust verification via a server (TTP), involving higher communication costs due to the involvement of an additional party. In computational costs, Scheme-I is more efficient than Scheme-II. On the other hand, Scheme-II employs computationally heavy pairing operations for plaintext equality tests achieves lower communication costs due to the absence of a server. Our protocol has certain limitations, while our schemes perform efficiently for small-to-medium-sized IoT networks. Scalability to larger networks with thousands of devices is limited by increased communication and computational overhead. Server interaction in Scheme-I introduces latency, impacting real-time applications. Additionally, our security analysis relies on both the robustness of the underlying cryptographic primitives and the PUF’s resistance to physical attacks. These limitations need to be overcome by enhancing scalability to support large-scale IoT deployments, e.g., by integrating blockchain technology and by assessing the impact of quantum computing on the underlying cryptographic primitives and PUF’s resistance.

Author Contributions

Conceptualization, N.W.T. and M.M.; methodology, N.W.T. and M.M.; software, N.W.T.; validation, N.W.T. and M.M.; investigation, N.W.T. and M.M.; writing—original draft preparation, N.W.T.; writing—review and editing, N.W.T. and M.M.; visualization, N.W.T.; supervision, M.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The authors would like to thank the Ministry of Education, Culture, Sports, Science and Technology Japan (MEXT) for funding the scholarship to study at Kanazawa University. We would like to thank the School of Electrical Engineering and Computer Science for providing administrative and technical support to study at Kanazawa University.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PUFPhysically Unclonable Functions
PHEPaillier Homomorphic Encryption
CRPsChallenge–Response Pairs
GRGateway Router
CSPCloud Service Provider
TTPTrusted Third Party
NVMNon-Volatile Memory

Appendix A. Integrating PUF-Based Authentication Scheme-I

The system combines as a complete procedure to form a comprehensive and secure PUF-based authentication protocol. The system leverages the unique capabilities of physically unclonable functions (PUFs) and the cryptographic robustness of Paillier homomorphic encryption for Scheme-I. We present an integrated procedure of our scheme. Before the authentication and verification phases can be executed, each PUF-based IoT device needs to register through a registration process. This ensures that the device is uniquely identified and securely integrated into the system. This registration process establishes a secure foundation for the subsequent authentication and verification phases, ensuring that each PUF IoT device is uniquely and securely identified within the system.
As illustrated in Figure A1, the individual steps of the authentication and verification phases are combined into a single comprehensive diagram integrating secure PUF-based authentication systems. Appendix A.1 describes with in detail the process of the complete procedure of Scheme-I.
Figure A1. Integrating PUF-based authentication Scheme-I.

Appendix A.1. Procedure Utilizing Paillier Homomorphic Encryption Scheme-I

  • Step 1.1: The PUF device sends an authentication request containing its unique device identifier D i d to the gateway router.
  • Step 1.2: The gateway router contacts the CSP to retrieve the encrypted challenge and response associated with the device’s identity D i d .
  • Step 1.3: The CSP stores encrypted challenge–response pairs for each registered device. The gateway router retrieves the encrypted challenge–response corresponding to the PUF device identity D i d and decrypts the challenge.
  • Step 1.4: The decrypted challenge C i is sent to the PUF device.
  • Step 2.1: The PUF device receives C i and computes the response R i = P U F ( C i ) .
  • Step 2.2: The PUF device encrypts the response using Paillier homomorphic encryption in Scheme-I, resulting in R = E p k ( R i ) .
  • Step 2.3: The encrypted response R is sent back to the gateway router.
  • Step 2.4: The gateway router receives the encrypted response R .
  • Step 2.5: The gateway router receives two encrypted responses—one from the PUF device and another from the CSP.
  • Step 3.1: The gateway router computes C T = R · R 1 mod n 2 = E p k ( R i ) · E p k ( R i ) 1 mod n 2 .
  • Step 3.2: Due to the homomorphic properties of Paillier encryption, the gateway router calculates C T = g R i R i · r r n mod n 2 .
  • Step 3.3: If R i = R i , then C T is a ciphertext of zero: C T = E ( 0 , r r ) = g 0 · r r n mod n 2 .
  • Step 3.4: The gateway router sends C T to the Server for verification.
  • Step 3.5: The server, using its private key s k , decrypts C T to verify that it is indeed a ciphertext of zero.
  • Step 3.6: The server computes v = C T n mod n and chooses a random number r ^ Z n * , computing a = E ( 0 , r ^ ) = g 0 r ^ n mod n 2 .
  • Step 3.7: The server computes the value e = h ( a ) using a cryptographic hash function h, and then computes z = r ^ · v e mod n 2 .
  • Step 3.8: The server sends ( a , z ) to the gateway router.
  • Step 3.9: The gateway router verifies whether C T , a , z are relatively prime to n. If they are, the router computes e = h ( a ) and verifies Equation E ( 0 , z ) = a · C T e mod n 2 .
The entire procedure from the initial authentication request to the final verification is clearly outlined, ensuring a secure and efficient process for the PUF-based authentication system utilizing Paillier homomorphic Scheme-1.

Appendix B. Integrating PUF-Based Authentication Scheme-II

For Scheme-II, we combine as a complete procedure to form a secure PUF-based authentication protocol. The system leverages the unique capabilities of physically unclonable functions (PUFs) and the cryptographic robustness of the plaintext equality test.
The Figure A2 and Appendix B.1 describe the individual steps of the authentication and verification phases combined into a single comprehensive diagram integrating secure PUF-based authentication systems detailing the process of the complete procedure of Scheme-II.
Figure A2. Integrating PUF-based authentication Scheme-II.

Appendix B.1. Procedure Utilizing Plaintext Equality Testing Scheme-II

  • Step 1.1: The PUF device sends an authentication request containing its unique device identifier D i d to the gateway router.
  • Step 1.2: Upon receiving the request, the gateway router contacts the CSP to retrieve the encrypted challenge and response associated with the device’s identity D i d .
  • Step 1.3: The CSP stores encrypted challenge–response pairs for each registered device. The gateway router retrieves the encrypted challenge–response corresponding to the PUF device identity D i d and decrypts the challenge.
  • Step 1.4: The decrypted challenge C i is transmitted to the PUF device.
  • Step 2.1: The PUF device receives C i and computes the response R i = P U F ( C i ) .
  • Step 2.2: The PUF device encrypts the response using plaintext equality testing of the ElGamal encryption in Scheme-I, resulting in R = E p k ( R i ) .
  • Step 2.3: The encrypted response R is sent back to the gateway router.
  • Step 2.4: The gateway router receives the encrypted response R .
  • Step 2.5: The gateway router receives two encrypted responses: one from the PUF device and another from the CSP.
  • Step 3.1: The gateway router generates the private key s k and public key p k : s k : x R Z p ,
    p k : h = g x G 1 ,
    - The gateway router further generates a trapdoor: t k = ( r ^ , t ^ = r ^ x ) G 2 2 where r ^ R G 2 .
  • Step 3.2: The gateway router receives the ciphertext R = ( R 1 , R 2 ) = ( g α , m h α ) from the PUF device and ciphertext R = ( R 1 , R 2 ) = ( g α , m h α ) from the CSP.
  • Step 3.3: The Gateway Router checks the equality of:
    e ( R 2 , r ^ ) · e ( R 1 , t ^ ) 1 = e ( R 2 , r ^ ) · e ( R 1 , t ^ ) 1
If the equation holds, the plaintexts are equal, and the device is authenticated. Otherwise, the authentication request is declined.

References

  1. Nandy, T.; Idris, M.Y.I.B.; Md Noor, R.; Mat Kiah, L.; Lun, L.S.; Annuar Juma’at, N.B.; Ahmedy, I.; Abdul Ghani, N.; Bhattacharyya, S. Review on Security of Internet of Things Authentication Mechanism. IEEE Access 2019, 7, 151054–151089. [Google Scholar] [CrossRef]
  2. Zerrouki, F.; Ouchani, S.; Bouarfa, H. PUF-based mutual authentication and session key establishment protocol for IoT devices. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 12575–12593. [Google Scholar] [CrossRef]
  3. Zhou, W.; Jia, Y.; Peng, A.; Zhang, Y.; Liu, P. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet of Things J. 2019, 6, 1606–1616. [Google Scholar] [CrossRef]
  4. Mukhopadhyay, D. PUFs as Promising Tools for Security in Internet of Things. IEEE Des. Test 2016, 33, 103–115. [Google Scholar] [CrossRef]
  5. Armknecht, F.; Boyd, C.; Carr, C.; Gjøsteen, K.; Jäschke, A.; Reuter, C.A.; Strand, M. A Guide to Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015, 2015, 1192. [Google Scholar]
  6. Zhang, C.; Li, S.; Xia, J.; Wang, W.; Yan, F.; Liu, Y. BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 20), Boston, MA, USA, 15–17 July 2020; pp. 493–506. [Google Scholar]
  7. LÃpez Delgado, J.L.; Álvarez Bermejo, J.A.; López Ramos, J.A. Homomorphic Asymmetric Encryption Applied to the Analysis of IoT Communications. Sensors 2022, 22, 8022. [Google Scholar] [CrossRef] [PubMed]
  8. Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology—EUROCRYPT ′99; Stern, J., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar]
  9. Alqarni, A.A. A secure approach for data integration in cloud using paillier homomorphic encryption. J. Basic Appl. Sci. 2021, 5, 15–21. [Google Scholar]
  10. Blazy, O.; Derler, D.; Slamanig, D.; Spreitzer, R. Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. Cryptology ePrint Archive, 2016. Paper 2016/082. Available online: https://eprint.iacr.org/2016/082 (accessed on 3 June 2024).
  11. ElGamal, T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
  12. Umoren, O.; Singh, R.; Awan, S.; Pervez, Z.; Dahal, K. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Sensors 2022, 22, 8969. [Google Scholar] [CrossRef]
  13. Fakroon, M.; Gebali, F.; Mamun, M. Multifactor authentication scheme using physically unclonable functions. Internet of Things 2021, 13, 100343. [Google Scholar] [CrossRef]
  14. Alladi, T.; Chamola, V.; Naren. HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks. IEEE J. Sel. Areas Commun. 2021, 39, 361–369. [Google Scholar] [CrossRef]
  15. Chaterjee, U.; Mukhopadhyay, D.; Chakraborty, R.S. 3PAA: A Private PUF Protocol for Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 2021, 16, 756–769. [Google Scholar] [CrossRef]
  16. Qureshi, M.A.; Munir, A. PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–7. [Google Scholar]
  17. Liang, W.; Xie, S.; Long, J.; Li, K.C.; Zhang, D.; Li, K. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf. Sci. 2019, 503, 129–147. [Google Scholar] [CrossRef]
  18. Byun, J.W. End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions. IEEE Access 2019, 7, 102951–102965. [Google Scholar] [CrossRef]
  19. Qureshi, M.A.; Munir, A. PUF-RLA: A PUF-Based Reliable and Lightweight Authentication Protocol Employing Binary String Shuffling. In Proceedings of the 2019 IEEE 37th International Conference on Computer Design (ICCD), Abu Dhabi, United Arab Emirates, 17–20 November 2019; pp. 576–584. [Google Scholar] [CrossRef]
  20. Aman, M.N.; Javaid, U.; Sikdar, B. A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 2021, 8, 1123–1139. [Google Scholar] [CrossRef]
  21. Muhal, M.A.; Luo, X.; Mahmood, Z.; Ullah, A. Physical Unclonable Function Based Authentication Scheme for Smart Devices in Internet of Things. In Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT), Xi’an, China, 17–19 August 2018; pp. 160–165. [Google Scholar] [CrossRef]
  22. Najafi, F.; Kaveh, M.; Martín, D.; Reza Mosavi, M. Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks. Sensors 2021, 21, 2009. [Google Scholar] [CrossRef]
  23. Idriss, T.A.; Idriss, H.A.; Bayoumi, M.A. A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices. IEEE Access 2021, 9, 80546–80558. [Google Scholar] [CrossRef]
  24. Mahalat, M.H.; Saha, S.; Mondal, A.; Sen, B. A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices. In Proceedings of the 2018 8th International Symposium on Embedded Computing and System Design (ISED), Cochin, India, 3–15 December 2018; pp. 183–187. [Google Scholar]
  25. Yanambaka, V.; Mohanty, S.; Kougianos, E.; Puthal, D.; Rachakonda, L. PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT). In Proceedings of the 2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), Rourkela, India, 16–18 December 2019; IEEE Computer Society: Los Alamitos, CA, USA, 2019; pp. 320–321. [Google Scholar] [CrossRef]
  26. Kim, B.; Yoon, S.; Kang, Y.; Choi, D. PUF based IoT Device Authentication Scheme. In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Republic of Korea, 16–18 October 2019; pp. 1460–1462. [Google Scholar] [CrossRef]
  27. Chatterjee, U.; Govindan, V.; Sadhukhan, R.; Mukhopadhyay, D.; Chakraborty, R.S.; Mahata, D.; Prabhu, M.M. Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database. IEEE Trans. Dependable Secur. Comput. 2019, 16, 424–437. [Google Scholar] [CrossRef]
  28. Bansal, G.; Naren, N.; Chamola, V.; Sikdar, B.; Kumar, N.; Guizani, M. Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function. IEEE Trans. Veh. Technol. 2020, 69, 7234–7246. [Google Scholar] [CrossRef]
  29. Nimmy, K.; Sankaran, S.; Achuthan, K. A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 6227–6242. [Google Scholar] [CrossRef]
  30. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  31. Available online: https://crypto.stackexchange.com/questions/36998/equality-checking-using-additive-homomorphic-encryption (accessed on 30 May 2024).
  32. Damgãrd, I.; Jurik, M.; Nielsen, J.B. A generalization of Paillier’s public-key system with applications to electronic voting. Int. J. Inf. Secur. 2010, 9, 371–385. [Google Scholar] [CrossRef]
  33. Feng, W.; Qin, Y.; Zhao, S.; Feng, D. AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw. 2018, 134, 167–182. [Google Scholar] [CrossRef]
  34. Yilmaz, Y.; Gunn, S.; Halak, B. Lightweight PUF-Based Authentication Protocol for IoT Devices. In Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Costa Brava, Spain, 2–4 July 2018; pp. 38–43. [Google Scholar] [CrossRef]
  35. AVISPA Team. HLPSL Tutorial: A Beginner’s Guide to Modelling and Analysing Internet Security Protocols; Project Funded by the European Community under the Information Society Technologies Programme (1998–2002); Document Version: 1.1; AVISPA Team: Brussels, Belgium, 2006. [Google Scholar]
  36. Viganò, L. Automated Security Protocol Analysis with the AVISPA Tool. Electron. Notes Theor. Comput. Sci. 2006, 155, 61–86. [Google Scholar] [CrossRef]
  37. Granlund, T.; Team, T.G.D. GNU MP: The GNU Multiple Precision Arithmetic Library. Version: 6.2.1. Available online: http://gmplib.org/ (accessed on 20 January 2024).
  38. Lynn, B.; Team, T.P.D. PBC: The Pairing-Based Cryptography Arithmetic Library. Version 0.5.14. Available online: https://crypto.stanford.edu/pbc/ (accessed on 20 January 2024).
  39. Akinyele, J.; Green, M.; Hohenberger, S.; Pagano, M.; Feldman, A.; Wolinsky, D.; Gunter, C.A. Charm: A Framework for Rapidly Prototyping Cryptosystems. Version as of 20 January 2024. Available online: https://github.com/JHUISI/charm (accessed on 20 January 2024).
  40. Barker, E. Recommendation for Key Management, Part 1: General; NIST Special Publication 800-57 Part 1 Rev. 5; National Institute of Standards and Technology (NIST): Washington, DC, USA, 2020. [Google Scholar] [CrossRef]
  41. Yeh, K.H.; Liu, F.; Yan, Y.; Sun, Y.; Liu, J.; Li, D.; Guan, Z. Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid. Secur. Commun. Netw. 2022, 2022, 9774853. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.