{"title":"Secure and Lightweight Authentication Protocol Using PUF for the IoT-based Wireless Sensor Network","authors":"Sourav Roy, Dipnarayan Das, Bibhash Sen","doi":"10.1145/3624477","DOIUrl":null,"url":null,"abstract":"The wireless sensor network (WSN) has been gaining popularity for automation and performance improvement in different IoT-based applications. The resource-constrained nature and operating environment of IoT make the devices highly vulnerable to different attacks. On the other hand, the Physically Unclonable Function (PUF) helps to implement secure and lightweight authentication protocols for IoT. In this context, few computation-intensive authentication protocols are found in the literature that have addressed secure IoT communication in WSN. Besides, these protocols depend on the local storage of PUF-CRP, which is susceptible to security attacks. This work proposes a lightweight and secure authentication protocol for the IoT devices in WSN. A PUF and its machine learning (ML)–based soft model is integrated to ensure secure authentication and lightweight computation in WSN. PUF prevents physical attacks while carrying very less hardware fingerprints, and the ML-based PUF provides the desired resiliency against PUF identity-based attacks by eliminating the requirement of CRP-based storage. The proposed mechanism delivers two-way authentication while nullifying the attacks on IoT. The proposed protocol is implemented on Xilinx Artix-7 FPGA and Raspberry Pi for testability and performance evaluation. Experiment results and analysis signify its low-cost computations and lightweight features desired for IoT.","PeriodicalId":50924,"journal":{"name":"ACM Journal on Emerging Technologies in Computing Systems","volume":"17 8 1","pages":"0"},"PeriodicalIF":2.1000,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Journal on Emerging Technologies in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3624477","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
The wireless sensor network (WSN) has been gaining popularity for automation and performance improvement in different IoT-based applications. The resource-constrained nature and operating environment of IoT make the devices highly vulnerable to different attacks. On the other hand, the Physically Unclonable Function (PUF) helps to implement secure and lightweight authentication protocols for IoT. In this context, few computation-intensive authentication protocols are found in the literature that have addressed secure IoT communication in WSN. Besides, these protocols depend on the local storage of PUF-CRP, which is susceptible to security attacks. This work proposes a lightweight and secure authentication protocol for the IoT devices in WSN. A PUF and its machine learning (ML)–based soft model is integrated to ensure secure authentication and lightweight computation in WSN. PUF prevents physical attacks while carrying very less hardware fingerprints, and the ML-based PUF provides the desired resiliency against PUF identity-based attacks by eliminating the requirement of CRP-based storage. The proposed mechanism delivers two-way authentication while nullifying the attacks on IoT. The proposed protocol is implemented on Xilinx Artix-7 FPGA and Raspberry Pi for testability and performance evaluation. Experiment results and analysis signify its low-cost computations and lightweight features desired for IoT.
期刊介绍:
The Journal of Emerging Technologies in Computing Systems invites submissions of original technical papers describing research and development in emerging technologies in computing systems. Major economic and technical challenges are expected to impede the continued scaling of semiconductor devices. This has resulted in the search for alternate mechanical, biological/biochemical, nanoscale electronic, asynchronous and quantum computing and sensor technologies. As the underlying nanotechnologies continue to evolve in the labs of chemists, physicists, and biologists, it has become imperative for computer scientists and engineers to translate the potential of the basic building blocks (analogous to the transistor) emerging from these labs into information systems. Their design will face multiple challenges ranging from the inherent (un)reliability due to the self-assembly nature of the fabrication processes for nanotechnologies, from the complexity due to the sheer volume of nanodevices that will have to be integrated for complex functionality, and from the need to integrate these new nanotechnologies with silicon devices in the same system.
The journal provides comprehensive coverage of innovative work in the specification, design analysis, simulation, verification, testing, and evaluation of computing systems constructed out of emerging technologies and advanced semiconductors