{"title":"Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study","authors":"Amir Masoud Aminian Modarres;Ghazaleh Sarbishaei","doi":"10.1109/LNET.2023.3298775","DOIUrl":null,"url":null,"abstract":"Almost all IoT applications require secure user authentication protocols. Due to the limitations of most IoT devices and the possibility of physical attacks, lightweight authentication protocols based on Physical Unclonable Functions (PUF) are widely used. To design an efficient scheme, it is helpful to learn weaknesses of existing protocols and provide guidelines for future protocol designers. In this letter, using a formal framework, we discuss the vulnerabilities of a recent PUF-based protocol proposed by Gope et al. We prove our claims concerning protocol vulnerabilities in this framework according to propositional logic. Moreover, we suggest countermeasures for improving the protocol’s security.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"5 4","pages":"304-308"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Networking Letters","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10194248/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Almost all IoT applications require secure user authentication protocols. Due to the limitations of most IoT devices and the possibility of physical attacks, lightweight authentication protocols based on Physical Unclonable Functions (PUF) are widely used. To design an efficient scheme, it is helpful to learn weaknesses of existing protocols and provide guidelines for future protocol designers. In this letter, using a formal framework, we discuss the vulnerabilities of a recent PUF-based protocol proposed by Gope et al. We prove our claims concerning protocol vulnerabilities in this framework according to propositional logic. Moreover, we suggest countermeasures for improving the protocol’s security.