Font Size: a A A

Research On Security Authentication Protocol Based On Physical Unclonable Function In Internet Of Things

Posted on:2023-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y C WangFull Text:PDF
GTID:2558307061450444Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
The Internet of Things(Io T)has brought great convenience to all aspects of people’s lives,but at the same time its security issues have also encountered unprecedented challenges.With the dramatic growth of the number of Io T devices and the expansion of Io T application scenarios,the security of Io T systems is getting more and more attention.Designing lightweight security authentication protocols based on physical unclonable function(PUF)can improve the security performance and efficiency of the system,which is important to guarantee data security and privacy.(1)To address the problem of resource-constrained Io T devices in radio frequency identification(RFID)systems,a lightweight security authentication protocol based on PUF is proposed.Firstly,by using hash functions and logical operations,with the help of physical unclonable functions,the protocol avoids problems such as inefficiencies caused by frequent certificate interactions.Secondly,the use of pseudonymous identity information for communication avoids the leakage of the real identity information of the tag and guarantees the privacy requirements of the system.Besides,the use of time threshold ensures that the system can resist desynchronization attacks and improves the security performance of the protocol.Finally,the communication steps are simplified in the initialization phase to reduce the computational and communication overhead of the protocol while ensuring security.The security analysis shows that the protocol can meet common privacy and security requirements and can resist desynchronization attacks.The experimental results show that the protocol is suitable for RFID systems,and the computational overhead and storage overhead of this protocol can meet the requirements of tags compared with other protocols.(2)To address the problems that the vehicular ad-hoc network(VANET)system overly relies on the trust party agent(TPA)to distribute and update the key,and there is a single point of failure that affects the system operation efficiency,a security authentication protocol for VANET based on PUF is proposed.Firstly,by introducing a regional key with regular updates,the VANET system avoids over-reliance on system keys and security problems caused by private information stored in the device for a long time.Secondly,due to the need to protect the privacy in the VANET system,the real identity information of the vehicle is protected to achieve privacy and security.Finally,in addition to the traditional key,PUF is introduced for authentication,and the two-factor authentication approach improves the security of the system while controlling the computational overhead.The protocol also gives a specific process for the revocation of vehicle identity,which ensures the update of the trusted entities of the system.The analysis of security and experimental results shows that the protocol can meet the requirements of the VANET system.(3)To address the problem of inefficiency caused by multiple execution of similar operations in Io T systems containing a large number of homogeneous devices,a group authentication protocol based on PUF for Io T systems is proposed.Firstly,by using the physical unclonable function,the insecurity caused by storing private information in Io T devices for a long time is avoided.Secondly,the use of factorial tree further reduces the computation overhead and communication overhead in the process of key update compared with the structure of binary tree.Finally,the process of group key generation and distribution avoids plaintext transmission,which further improves the security of the system.The security analysis shows that this protocol can effectively resist physical cloning attacks,and ensure the privacy protection requirements,information integrity and forward-backward security of the system.The analysis of experimental results shows that this protocol has less computational overhead and better performance in the update phase of the key.
Keywords/Search Tags:Internet of Things, Physical Unclonable Function, Radio Frequency Identification, Vehicular Ad-hoc Network, Group Authentication
PDF Full Text Request
Related items