Computer Science ›› 2014, Vol. 41 ›› Issue (4): 168-171.

Previous Articles     Next Articles

Universally Composable Secure Authentication Protocol for Mobile Sensors Based on Physical Unclonable Function System

SONG Sheng-yu,ZHANG Zi-nan,WANG Ya-di and LI Jun-feng   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Internet of Things consists of sensor subnet and transmission network.For sensor subnet,it usually collects information by sensor node which has bad ability of computing,communication and storage implemented by combining mobile nodes and static nodes.But for transmission network,it commonly provides strong service of computing,communication and storage by making use of the existing internet infrastructure.To assure security control mechanics when the mobile sensors move from one cluster to another,whenever,to take into account both the security and feasibility of practical application,this paper presented an authentication and key exchange protocol based on Physical Unclonable Function(PUF).This protocol can achieve bidirectional authentication and key negotiation between mobile sensor and transmission network base station when the mobile sensor roams to other cluster .Analysis shows that the proposed protocol is universally composable secure.

Key words: Internet of things,Physical unclonable function(PUF),Physical unclonable function system(PUFS),Universal composition security

[1] Canetti R.Universally composable security:A new paradigm for cryptographic protocols[C]∥Proceedings of the 42nd IEEE Symposium on the FOCS.New York:IEEE Computer Society Press,2001:136-145
[2] Canetti R,Halevi S,Katz J,et al.Universally composable password-based key exchange[C]∥Advances in Cryptology,Eurocrypt’05.LNCS.Vol.3494,Berlin:Springer-Verlag,2005:404-421
[3] Moran T,Segev G.David and goliath commitments:UC computation for asymmetric parties using tamper-proof hardware[C]∥EUROCRYPT,volume 4965of Lecture Notes in Computer Science.Springer,2008:527-544
[4] Pappu R S.Physical One-Way Functions[D].Massachusetts Institute of Technology,2001
[5] Tuyls P,Schrijen G J,koricB,et al.Read-Proof Hardware from Protective Coatings.Cryptographic Hardware and Embedded Systems Workshop[C]∥Lecture Notes in Computer Science.New York,NY:Springer,2006,4249:369-383
[6] Hammouri G,ztürk E,Birand B,et al.Unclonable Lightweight Authentication Scheme[C]∥Proceedings of the 10th International Conference on Information and Communications Security (ICICS 2008).Heidelberg:Springer,2008:33-48
[7] Dodis Y,Ostrovsky R,Reyzin L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[J].SIAM J.Comput.,2008,38(1):97-139
[8] 冯涛,李凤华,马建峰,等.UC安全的并行可否认认证新方法[J].中国科学E辑:信息科学,2008,8:1220-1233
[9] Ben-Or M,Goldwasser S,Wigderson A.Completeness theorems for non-cryptographic fault-tolerant distributed computation[C]∥Proc.20th STOC.ACM,1988:1-10
[10] Canetti R.Universally composable security:A new paradigm for cryptographic protocols [C]∥Proceedings of the 42nd IEEE Symposium on the FOCS.New York:IEEE Computer Society Press,2001:136-145

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!