Journal on Communications ›› 2022, Vol. 43 ›› Issue (7): 49-61.doi: 10.11959/j.issn.1000-436x.2022125
• Papers • Previous Articles Next Articles
Zhenyu WANG1, Yang GUO1, Shaoqing LI1, Shen HOU2, Ding DENG1
Revised:
2022-03-15
Online:
2022-07-25
Published:
2022-06-01
Supported by:
CLC Number:
Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices[J]. Journal on Communications, 2022, 43(7): 49-61.
"
协议 | 双向认证 | 不可追踪性 | 可扩展性 | 前向/后向安全性 | 数据完整性 | 不可克隆性 | DoS攻击 | 重放攻击 | 物理攻击 | 建模攻击 | 假冒攻击 | 中间人攻击 | 去同步攻击 |
Wang等[ | √ | √ | × | √ | √ | √ | √ | √ | × | × | √ | √ | × |
Patil等[ | √ | √ | × | √ | √ | √ | × | √ | × | × | √ | √ | × |
Gope等[ | √ | × | √ | √ | √ | √ | √ | √ | √ | × | √ | √ | √ |
Bian等[ | √ | × | × | √ | √ | √ | × | √ | × | √ | √ | √ | √ |
Qureshi等[ | √ | √ | √ | √ | × | √ | × | √ | × | × | √ | √ | √ |
黄可可等[ | √ | √ | × | √ | × | √ | × | √ | × | × | × | √ | √ |
本文协议 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
[1] | HAGHI K M , MADANIPOUR M , NIKRAVAN M ,et al. A systematic review of IoT in healthcare:applications,techniques,and trends[J]. Journal of Network and Computer Applications, 2021,192: 103-164. |
[2] | SHAFIQUE K , KHAWAJA B A , SABIR F ,et al. Internet of things (IoT) for next-generation smart systems:a review of current challenges,future trends and prospects for emerging 5G-IoT Scenarios[J]. IEEE Access, 2020,8: 23022-23040. |
[3] | BEDI G , VENAYAGAMOORTHY G K , SINGH R . Review of Internet of things (IoT) in electric power and energy systems[J]. IEEE Internet of Things Journal, 2018,5(2): 847-870. |
[4] | 毅宇, 周威, 赵尚儒 ,等. 物联网安全研究综述:威胁、检测与防御[J]. 通信学报, 2021,42(8): 188-205. |
YANG Y Y , ZHOU W , ZHAO S R ,et al. Survey of IoT security research:threats,detection and defense[J]. Journal on Communications, 2021,42(8): 188-205. | |
[5] | IBRAHIM A , DALKILIC G . Review of different classes of RFID authentication protocols[J]. Wireless Networks, 2019,25(3): 961-974. |
[6] | LI W , LI X L , GAO J T ,et al. Design of secure authenticated key management protocol for cloud computing environments[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(3): 1276-1290. |
[7] | IU S M , WANG D , XU G A ,et al. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 1338-1351. |
[8] | AO Y S , AL-SARAWI S F , ABBOTT D . Physical unclonable functions[J]. Nature Electronics, 2020,3(2): 81-91. |
[9] | ELVAUX J . Machine-learning attacks on PolyPUFs,OB-PUFs,RPUFs,LHS-PUFs,and PUF-FSMs[J]. IEEE Transactions on Information Forensics and Security, 2019,14(8): 2043-2058. |
[10] | 叶靖, 胡瑜, 李晓维 . 非确定性仲裁型物理不可克隆函数设计[J]. 计算机辅助设计与图形学学报, 2017,29(1): 166-171. |
YE J , HU Y , LI X W . Nondeterministic logic based arbiter physical unclonable function[J]. Journal of Computer-Aided Design & Computer Graphics, 2017,29(1): 166-171. | |
[11] | PRADA-DELGADO M A , VáZQUEZ-REYES A , BATURONE I . Trustworthy firmware update for Internet-of-thing devices using physical unclonable functions[C]// Proceedings of 2017 Global Internet of Things Summit (GIoTS). Piscataway:IEEE Press, 2017: 1-5. |
[12] | MALL P , AMIN R , DAS A K ,et al. PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:a comprehensive survey[J]. IEEE Internet of Things Journal, 2022,9(11): 8205-8228. |
[13] | GU C Y , CHANG C H , LIU W Q ,et al. A modeling attack resistant deception technique for securing lightweight-PUF-based authentication[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021,40(6): 1183-1196. |
[14] | GOPE P , LEE J , QUEK T Q S . Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions[J]. IEEE Transactions on Information Forensics and Security, 2018,13(11): 2831-2843. |
[15] | HOSSAIN M , NOOR S , HASAN R . HSC-IoT:a hardware and software co-verification based authentication scheme for Internet of things[C]// Proceedings of 2017 5th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering (MobileCloud). Piscataway:IEEE Press, 2017: 109-116. |
[16] | AKGüN M , ?A?LAYAN M U , . Providing destructive privacy and scalability in RFID systems using PUFs[J]. Ad Hoc Networks, 2015,32: 32-42. |
[17] | ZHOU L , LI X , YEH K H ,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance[J]. Future Generation Computer Systems, 2019,91: 244-251. |
[18] | MORIYAMA D , MATSUO S , YUNG M . PUF-based RFID authentication secure and private under memory leakage[R]. 2014. |
[19] | PATIL A S , HAMZA R , HASSAN A ,et al. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts[J]. Computers & Security, 2020,97:101958. |
[20] | XIE Q , HU B , TAN X ,et al. Robust anonymous two-factor authentication scheme for roaming service in global mobility network[J]. Wireless Personal Communications, 2014,74(2): 601-614. |
[21] | DOLEV D , YAO A . On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983,29(2): 198-208. |
[22] | WANG W Z , CHEN Q , YIN Z M ,et al. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks[J]. IEEE Internet of Things Journal, 2022,9(11): 8883-8891. |
[23] | BIAN W X , GOPE P , CHENG Y Q ,et al. Bio-AKA:an efficient fingerprint based two factor user authentication and key agreement scheme[J]. Future Generation Computer Systems, 2020,109: 45-55. |
[24] | QURESHI M A , MUNIR A . PUF-RAKE:a PUF-based robust and lightweight authentication and key establishment protocol[J]. IEEE Transactions on Dependable and Secure Computing, 2021,PP(99): 1. |
[25] | 黄可可, 刘亚丽, 殷新春 . 一种基于PUF的超轻量级RFID标签所有权转移协议[J]. 密码学报, 2020,7(1): 115-133. |
HUANG K K , LIU Y L , YIN X C . A PUF-based ultra-lightweight ownership transfer protocol for low-cost RFID tags[J]. Journal of Cryptologic Research, 2020,7(1): 115-133. | |
[26] | FEISTEL H , NOTZ W A , SMITH J L . Some cryptographic techniques for machine-to-machine data communications[J]. Proceedings of the IEEE, 1975,63(11): 1545-1554. |
[27] | SCHNEIER B . Applied cryptography:protocols,algorithms,and source code in C[M]. New York: Wiley, 1996. |
[28] | HOU S , DENG D , WANG Z Y ,et al. A dynamically configurable LFSR-based PUF design against machine learning attacks[J]. CCF Transactions on High Performance Computing, 2021,3(1): 31-56. |
[29] | AYSU A , GULCAN E , MORIYAMA D . End-to-end design of a PUF-based privacy preserving authentication protocol[C]// Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2015: 556-576. |
[1] | Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG. GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents [J]. Journal on Communications, 2023, 44(6): 183-197. |
[2] | Shengbao WANG, Xin ZHOU, Kang WEN, Bosen WENG. Tripartite authenticated key exchange protocol for smart grid [J]. Journal on Communications, 2023, 44(2): 210-218. |
[3] | Shuai LIU, Jie GUAN, Bin HU, Sudong MA. Differential analysis of lightweight cipher algorithm ACE based on MILP [J]. Journal on Communications, 2023, 44(1): 39-48. |
[4] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[5] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[6] | Xinchun YIN, Mengyu WANG, Jianting NING. Lightweight searchable medical data sharing scheme [J]. Journal on Communications, 2022, 43(5): 110-122. |
[7] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
[8] | Zilong JIANG, Chenhui JIN. Impossible differential cryptanalysis of Saturnin algorithm [J]. Journal on Communications, 2022, 43(3): 53-62. |
[9] | Haili SUN, Xiang LONG, Lansheng HAN, Yan HUANG, Qingbo LI. Overview of anomaly detection techniques for industrial Internet of things [J]. Journal on Communications, 2022, 43(3): 196-210. |
[10] | Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130. |
[11] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[12] | Pingzhi FAN, Li LI, Huan CHEN, Gaofeng CHENG, Linjie YANG, Xiaobo TANG. Random access for massive Internet of things:current status, challenges and opportunities [J]. Journal on Communications, 2021, 42(4): 1-21. |
[13] | Hui TIAN, Hao WU, Yang TIAN, Jianyang REN, Yajuan CUI, Wenbao AI, Jianhua YUAN. Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things [J]. Journal on Communications, 2021, 42(4): 89-99. |
[14] | Zhengyu ZHU, Jinlei XU, Gangcan SUN, Ning WANG, Wanming HAO. Secure beamforming design for IRS-assisted SWIPT Internet of things system [J]. Journal on Communications, 2021, 42(4): 185-193. |
[15] | Wanming HAO, Jinkun XIE, Gangcan SUN, Zhengyu ZHU, Yiqing ZHOU. Robust chance-constrained optimization algorithm design for secure wireless powered backscatter communication system [J]. Journal on Communications, 2021, 42(3): 100-110. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|