Visible to the public Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

TitleBuilding PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Publication TypeJournal Article
Year of Publication2019
AuthorsChatterjee, Urbi, Govindan, Vidya, Sadhukhan, Rajat, Mukhopadhyay, Debdeep, Chakraborty, Rajat Subhra, Mahata, Debashis, Prabhu, Mukesh M.
JournalIEEE Transactions on Dependable and Secure Computing
Volume16
Pagination424–437
Date Publishedmay
ISSN1941-0018
KeywordsArtix-7 FPGA, authentication, Cameras, composability, cryptographic protocols, Databases, device authentication, Digilent Nexys-4 FPGA board, Elliptic curve cryptography, Encryption, Hardware, identity based encryption, Intel Edison board, Internet of Things, IoT infrastructure, IoT node, IP-spoofing, key exchange protocol, Key Management, Keyed hash function, man-in-the-middle attack, message authentication, password dependency, physically unclonable functions, protocol resists, Protocols, pubcrawl, PUF based authentication, pufs, secret challenge-response pair, secured video surveillance camera, Session Key Security, stand-alone video camera, standard network penetration tools, traditional authentication protocols, universal composability framework, verifier database
AbstractPhysically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs). In traditional authentication protocols a user presents a set of credentials with an accompanying proof such as password or digital certificate. However, IoTs need more evolved methods as these classical techniques suffer from the pressing problems of password dependency and inability to bind access requests to the “things” from which they originate. Additionally, the protocols need to be lightweight and heterogeneous. Although PUFs seem promising to develop such mechanism, it puts forward an open problem of how to develop such mechanism without needing to store the secret challenge-response pair (CRP) explicitly at the verifier end. In this paper, we develop an authentication and key exchange protocol by combining the ideas of Identity based Encryption (IBE), PUFs and Key-ed Hash Function to show that this combination can help to do away with this requirement. The security of the protocol is proved formally under the Session Key Security and the Universal Composability Framework. A prototype of the protocol has been implemented to realize a secured video surveillance camera using a combination of an Intel Edison board, with a Digilent Nexys-4 FPGA board consisting of an Artix-7 FPGA, together serving as the IoT node. We show, though the stand-alone video camera can be subjected to man-in-the-middle attack via IP-spoofing using standard network penetration tools, the camera augmented with the proposed protocol resists such attacks and it suits aptly in an IoT infrastructure making the protocol deployable for the industry.
DOI10.1109/TDSC.2018.2832201
Citation Keychatterjee_building_2019