TY - GEN
T1 - Physical unclonable function based authentication protocol for unit IoT and ubiquitous IoT
AU - Zhao, Min
AU - Yao, Xuanxia
AU - Liu, Hong
AU - Ning, Huansheng
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/7/2
Y1 - 2016/7/2
N2 - Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.
AB - Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.
KW - Authentication
KW - BAN logic
KW - Object Life Cycle
KW - Physical Unclonable Function
KW - Unit IoT and Ubiquitous IoT
UR - https://www.scopus.com/pages/publications/85050892850
U2 - 10.1109/IIKI.2016.85
DO - 10.1109/IIKI.2016.85
M3 - 会议稿件
AN - SCOPUS:85050892850
T3 - Proceedings - 2016 International Conference on Identification, Information and Knowledge in the Internet of Things, IIKI 2016
SP - 179
EP - 184
BT - Proceedings - 2016 International Conference on Identification, Information and Knowledge in the Internet of Things, IIKI 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 International Conference on Identification, Information and Knowledge in the Internet of Things, IIKI 2016
Y2 - 20 October 2016 through 21 October 2016
ER -