Back to Search Start Over

On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices

Authors :
Da-Zhi Sun
Yi-Na Gao
Yangguang Tian
Source :
Sensors, Vol 23, Iss 14, p 6559 (2023)
Publication Year :
2023
Publisher :
MDPI AG, 2023.

Abstract

Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.

Details

Language :
English
ISSN :
23146559 and 14248220
Volume :
23
Issue :
14
Database :
Directory of Open Access Journals
Journal :
Sensors
Publication Type :
Academic Journal
Accession number :
edsdoj.69c6130c40754d669bd29806a3b2f5d4
Document Type :
article
Full Text :
https://doi.org/10.3390/s23146559