Font Size: a A A

Research On Authentication Protocol Based On Physical Unclonable Function

Posted on:2021-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhangFull Text:PDF
GTID:2492306050466484Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
As an extension of the Internet of Things in the field of transportation,the Internet of Vehicles(Io V)can provide transportation managers and drivers with more specific road conditions,traffic and entertainment information,which greatly facilitates the vehicle management and the route planning,achieves energy saving and emission reduction,ensures driving safety,and improves the intelligent level of social transportation services.With the continuous popularization of the Io V,users’ remote access to vehicle data will cause the transmission of a large amount of sensitive data.Therefore,the Io V system should employ the Authentication and Key Agreement(AKA)protocol to ensure the authenticity of the user and the data security and privacy.In addition,since vehicles are often placed in unsupervised places,on-board sensors are vulnerable to physical attacks from adversaries.Therefore,the AKA protocol designed for the Io V system should ensure the security of the entire system even though the vehicle sensors are corrupted.Physical Unclonable Function(PUF)provides a feasible means to achieve these goals.At present,although lots of researchers have proposed a great deal of PUF-based authentication protocols,these protocols cannot be directly applied to the Io V system due to various deficiencies,such as(1)the inability to provide user anonymity and make them easy to be tracked by adversaries;(2)although they claim to provide user anonymity,they do not take into account the loss of messages during transmission and are easy suffered from desynchronization attacks;(3)they ignore the fact that the PUF response is noisy,which makes the Io V system may mistakenly deny legitimate users.Therefore,designing a robust and efficient AKA protocol based on PUF is not easy.In this paper,PUF is used to resist device corruption.Specifically,PUF acts as a hardware fingerprint generator,eliminating the need to store any secret information in vehicle sensors.Based on PUF,this paper designs a PUF-based Two-Factor Authentication(PUF-2FA)protocol and a PUF-based Three-Factor Authentication(PUF-3FA)protocol for the Io V scenario.The specific results are as follows:1.PUF-2FA scheme employs the PUF to realize the authentication of user device and vehicle sensors,so that sensors do not need to store any secret information,thereby achieving the physical security of the vehicle.First,the vehicle sensor with built-in PUF and the user who holds the password and the device with built-in PUF register with the same data center,respectively.Secondly,the reverse fuzzy extractor is used on both the user side and the vehicle sensor side to process the noise of the PUF response,and the computational burden on the user side and the vehicle sensor is reduced.The scheme introduces the fuzzy verifier to resist offline password guessing attacks.Finally,the detailed security analysis provided in this article shows that the proposed protocol can defend against a variety of known attacks.The comparison of security and efficiency shows the security and practicability of the PUF-2FA scheme.2.The PUF-3FA protocol combines user characteristics(biometrics)and device characteristics(PUF response)to realize feature fusion,making it difficult for adversaries to counterfeit multiple characteristics,thereby providing more robust security for Io V.First,a system model is given,which contains three participants: users,vehicle sensors,and a cloud server.Second,by utilizing fuzzy commitment,the PUF-3FA scheme can achieve resilience to the noise of PUF response and biometrics.Finally,a detailed security analysis is provided,and a formal analysis of the scheme under a random oracle model is given.
Keywords/Search Tags:PUF, authentication, key agreement, fuzzy extractor, feature fusion
PDF Full Text Request
Related items