Smart City Gnosys

Smart city article details

Title Puftap-Iot: Puf-Based Three-Factor Authentication Protocol In Iot Environment Focused On Sensing Devices
ID_Doc 43749
Authors Lee J.; Oh J.; Kwon D.; Kim M.; Yu S.; Jho N.-S.; Park Y.
Year 2022
Published Sensors, 22, 18
DOI http://dx.doi.org/10.3390/s22187075
Abstract In IoT-based environments, smart services can be provided to users under various environments, such as smart homes, smart factories, smart cities, smart transportation, and healthcare, by utilizing sensing devices. Nevertheless, a series of security problems may arise because of the nature of the wireless channel in the Wireless Sensor Network (WSN) for utilizing IoT services. Authentication and key agreements are essential elements for providing secure services in WSNs. Accordingly, two-factor and three-factor-based authentication protocol research is being actively conducted. However, IoT service users can be vulnerable to ID/password pair guessing attacks by setting easy-to-remember identities and passwords. In addition, sensors and sensing devices deployed in IoT environments are vulnerable to capture attacks. To address this issue, in this paper, we analyze the protocols of Chunka et al., Amintoosi et al., and Hajian et al. and describe their security vulnerabilities. Moreover, this paper introduces PUF and honey list techniques with three-factor authentication to design protocols resistant to ID/password pair guessing, brute-force, and capture attacks. Accordingly, we introduce PUFTAP-IoT, which can provide secure services in the IoT environment. To prove the security of PUFTAP-IoT, we perform formal analyses through Burrows Abadi Needham (BAN) logic, Real-Or-Random (ROR) model, and scyther simulation tools. In addition, we demonstrate the efficiency of the protocol compared with other authentication protocols in terms of security, computational cost, and communication cost, showing that it can provide secure services in IoT environments. © 2022 by the authors.
Author Keywords authentication; BAN logic; biometrics; honey list; IoT; PUF; ROR model; scyther; WSN


Similar Articles


Id Similarity Authors Title Published
3898 View0.905Satamraju K.P.; Malarkodi B.A Puf-Based Mutual Authentication Protocol For Internet Of ThingsProceedings of the 2020 International Conference on Computing, Communication and Security, ICCCS 2020 (2020)
5731 View0.883Yalli J.S.; Hasan M.H.A Unique Puf Authentication Protocol Based Fuzzy Logic Categorization For Internet Of Things (Iot) DevicesACM International Conference Proceeding Series (2023)
3800 View0.881Kim C.; Son S.; Park Y.A Privacy-Preserving Authentication Scheme Using Puf And Biometrics For Iot-Enabled Smart CitiesElectronics (Switzerland), 14, 10 (2025)
4520 View0.875Son S.; Kwon D.; Park Y.A Security Analysis Of "A Privacy-Preserving Three-Factor Authentication System For Iot-Enabled Wireless Sensor Networks"International Conference on Information Networking (2025)
43598 View0.874Ding Z.; Xie Q.Provably Secure Dynamic Anonymous Authentication Protocol For Wireless Sensor Networks In Internet Of ThingsSustainability (Switzerland), 15, 7 (2023)
2343 View0.871Saqib M.; Jasra B.; Moon A.H.A Lightweight Three Factor Authentication Framework For Iot Based Critical ApplicationsJournal of King Saud University - Computer and Information Sciences, 34, 9 (2022)
49021 View0.859Seifelnasr M.; Altawy R.; Youssef A.Skafs: Symmetric Key Authentication Protocol With Forward Secrecy For Edge ComputingIEEE Internet of Things Journal, 11, 1 (2024)
3897 View0.859Yuan P.; Li B.; Zhang Y.; Wu J.; Zheng H.; Wang C.A Puf-Based Lightweight Broadcast Authentication Protocol For Multi-Server Systems Using Blockchain2021 6th International Conference on Signal and Image Processing, ICSIP 2021 (2021)
4504 View0.856Haodudin Nurkifli E.; Hwang T.A Secure Lightweight Authentication Scheme In Iot Environment With Perfect Forward And Backward SecrecyIWBIS 2022 - 7th International Workshop on Big Data and Information Security, Proceedings (2022)
16766 View0.854Neerul N.; Kumar D.Cryptanalysis And Improvement Of An Authentication Protocol For Wireless Sensor NetworksTransactions on Emerging Telecommunications Technologies, 34, 5 (2023)