通信学报 ›› 2017, Vol. 38 ›› Issue (6): 127-135.doi: 10.11959/j.issn.1000-436x.2017125

• 学术论文 • 上一篇    下一篇

基于PUF和IPI的可穿戴设备双因子认证协议

王俊1,2,刘树波1,2,梁才1,2,李永凯1,2   

  1. 1 武汉大学空天信息安全与可信计算教育部重点实验室,湖北 武汉 430072
    2 武汉大学计算机学院,湖北 武汉 430072
  • 修回日期:2017-04-24 出版日期:2017-06-25 发布日期:2017-06-30
  • 作者简介:王俊(1983-),男,湖北潜江人,武汉大学博士生,主要研究方向为信息安全、隐私保护等。|刘树波(1970-),男,蒙古族,黑龙江齐齐哈尔人,博士,武汉大学教授、博士生导师,主要研究方向为信息安全、隐私保护、嵌入式系统等。|梁才(1993-),男,湖北仙桃人,武汉大学硕士生,主要研究方向为隐私保护。|李永凯(1988-),男,山东临沂人,武汉大学博士生,主要研究方向为信息安全、隐私保护等。
  • 基金资助:
    国家自然科学基金资助项目(41371402);国家自然科学基金资助项目(41671443);中央高校基本科研业务费专项基金资助项目(2015211020201);中央高校基本科研业务费专项基金资助项目(2042017gf0038)

Two-factor wearable device authentication protocol based on PUF and IPI

Jun WANG1,2,Shu-bo LIU1,2,Cai LIANG1,2,Yong-kai LI1,2   

  1. 1 Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education,Wuhan University,Wuhan 430072,China
    2 School of Computer,Wuhan University,Wuhan 430072,China
  • Revised:2017-04-24 Online:2017-06-25 Published:2017-06-30
  • Supported by:
    The National Natural Science Foundation of China(41371402);The National Natural Science Foundation of China(41671443);Fundamental Research Funds for the Central Universities(2015211020201);Fundamental Research Funds for the Central Universities(2042017gf0038)

摘要:

可穿戴设备正推进着移动医疗的快速发展,但无线体域网的开放式结构也给用户数据安全带来了更多威胁。为了数据安全,基于物理不可克隆函数和脉搏间隔,提出一种设备节点和数据中心之间的双因子认证协议。此协议利用设备物理特征和用户生物特征双重唯一性,有效地阻止了妥协和假冒等攻击,且适用于体域网环境下资源受限的医疗设备。与现有方案相比,增强了认证协议安全性。FPGA平台上实验证明了所提协议的实用性和有效性。

关键词: 认证协议, 双因子, 物理不可克隆函数, 脉搏间隔

Abstract:

Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.

Key words: authentication protocol, two-factor, physically unclonable function, interpulse interval

中图分类号: 

No Suggested Reading articles found!