Smart City Gnosys

Smart city article details

Title Skafs: Symmetric Key Authentication Protocol With Forward Secrecy For Edge Computing
ID_Doc 49021
Authors Seifelnasr M.; Altawy R.; Youssef A.
Year 2024
Published IEEE Internet of Things Journal, 11, 1
DOI http://dx.doi.org/10.1109/JIOT.2023.3285513
Abstract The IoT-edge-cloud paradigm enables resource-constrained IoT devices to offload their computation, thereby meeting the required quality-of-service for real-time applications. However, the deployment of IoT devices in public places, such as smart cities, exposes them to various security threats, including physical attacks. To address these security concerns, we propose a physical unclonable function (PUF)-based IoT-edge-cloud symmetric key authentication protocol with forward secrecy (SKAFS), which ensures the anonymity of transacting IoT devices, resilience to desynchronization-based denial-of-service attacks, and PUF modeling attacks. To evaluate the security of our protocol, we conduct a formal security analysis using the automated AVISPA tool. In addition, based on the indistinguishability property of the PUF, we formally prove that SKAFS is secure under the Canetti-Krawczyk-adversary model. Moreover, we implement the protocol using socket programming between a Raspberry Pi 1 as an IoT device, a Raspberry Pi 4 as an IoT gateway, and an 11th Gen Intel Core i7-11800H laptop as the cloud admin to simulate the message flow between the protocol entities in a real-time experiment and calculate its end-to-end latency. Finally, we compare SKAFS with other PUF-based protocols in terms of computation time, communication cost, and storage requirements. © 2014 IEEE.
Author Keywords Desynchronization attacks; edge computing; forward secrecy; IoT; mutual authentication; physical unclonable function (PUF); privacy-preserving


Similar Articles


Id Similarity Authors Title Published
41188 View0.861Tanveer M.; Aldosary A.; Khokhar S.-U.-D.; Das A.K.; Aldossari S.A.; Chaudhry S.A.Paf-Iod: Puf-Enabled Authentication Framework For The Internet Of DronesIEEE Transactions on Vehicular Technology, 73, 7 (2024)
43749 View0.859Lee J.; Oh J.; Kwon D.; Kim M.; Yu S.; Jho N.-S.; Park Y.Puftap-Iot: Puf-Based Three-Factor Authentication Protocol In Iot Environment Focused On Sensing DevicesSensors, 22, 18 (2022)
47114 View0.856Cao J.; Li S.; Ma R.; Han Y.; Zhang Y.; Li H.Rpria: Reputation And Puf-Based Remote Identity Attestation Protocol For Massive Iot DevicesIEEE Internet of Things Journal, 9, 19 (2022)
3800 View0.855Kim C.; Son S.; Park Y.A Privacy-Preserving Authentication Scheme Using Puf And Biometrics For Iot-Enabled Smart CitiesElectronics (Switzerland), 14, 10 (2025)
3897 View0.853Yuan P.; Li B.; Zhang Y.; Wu J.; Zheng H.; Wang C.A Puf-Based Lightweight Broadcast Authentication Protocol For Multi-Server Systems Using Blockchain2021 6th International Conference on Signal and Image Processing, ICSIP 2021 (2021)
3898 View0.852Satamraju K.P.; Malarkodi B.A Puf-Based Mutual Authentication Protocol For Internet Of ThingsProceedings of the 2020 International Conference on Computing, Communication and Security, ICCCS 2020 (2020)