Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2022 Nov 25;22(23):9174. doi: 10.3390/s22239174

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm

Tsu-Yang Wu 1, Fangfang Kong 1, Liyang Wang 1, Yeh-Cheng Chen 2, Saru Kumari 3, Jeng-Shyang Pan 1,4,*
Editors: Muhammad Naveed Aman, Chien-Ming Chen, Shehzad Ashraf Chaudhry
PMCID: PMC9740584  PMID: 36501875

Abstract

The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storage. The application of edge computing in the smart home environment can enable users to enjoy smart home services. However, users and smart devices communicate through public channels, and malicious attackers may intercept information transmitted through public channels, resulting in user privacy disclosure. Therefore, it is a critical issue to protect the secure communication between users and smart devices in the smart home environment. Furthermore, authentication protocols in smart home environments also have some security challenges. In this paper, we propose an anonymous authentication protocol that applies edge computing to the smart home environment to protect communication security between entities. To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. Finally, we compare our protocol with existing protocols regarding security and performance. The comparison results demonstrate that our protocol has higher security and slightly better performance.

Keywords: IoT, edge computing, smart home, PUF

1. Introduction

The internet of things (IoT) [1,2,3,4] is a network connected with everything, which can collect various types of information in real time and communicate with other devices. The development of the IoT has brought significant achievements in different fields, such as smart city [5,6,7,8], healthcare [9,10,11], vehicular ad hoc network (VANET) [12,13,14,15,16], smart home [17,18,19], and artificial intelligence [20,21]. The smart home is the embodiment of IoT. It is an environment in which smart devices are deployed in the house, and various devices provide services to users through connecting to the internet. People can access smart home services anytime and anywhere through voice assistants or applications and easily control smart devices. In the smart home environment, people’s live have become more comfortable, their lifestyle has become more intelligent, and people’s quality of life is also constantly improving.

Many smart devices are deployed in the smart home environment, such as smart air conditioners, smart desk lamps, and smart curtains. These smart devices can provide users with various services. The traditional framework of the smart home is shown in Figure 1. The framework consists of four entities: registration authority (RA), users, gateway, and smart devices. The primary responsibilities of RA include the registration of users and smart devices as well as the distribution of system parameters. Gateway is a bridge between smart devices and users. Only smart devices registered in RA can provide services for users. Users use mobile devices (such as smartphones, tablets, and smartwatches) to control smart devices in their homes at any time. For example, users can turn on the air conditioner and close the curtains outdoors; users can master the family situation by viewing the smart camera.

Figure 1.

Figure 1

Traditional architecture of smart home.

The traditional smart home architecture relies on centralized cloud computing, which is used for data collection and processing. There are some problems in the traditional architecture; for example, in monitoring this application scenario that requires real-time feedback, cloud computing [22,23,24] will process a great deal of data, which may not meet users’ real-time needs [25,26]. Edge computing [27,28,29] is closer to the data source than cloud computing. It can better process data and provide real-time access, solving the above problems. An edge gateway is the node of edge computing, which can give real-time computing and storage in the smart home environment instead of going to the remote cloud center. The edge gateway can locally process the data collected between the user’s mobile device and the smart device. First, the user and the smart device are registered in the registration center, and the registered legal user negotiates the session key with the smart device with the help of the edge gateway. Only legal users can enjoy smart home services. Although smart homes bring convenience to people’s lives, users and smart devices communicate through public channels. Due to the openness of the public channel, the information transmitted in the public channel may be intercepted by malicious attackers, which will lead to user privacy disclosure. Therefore, protecting users and smart devices for secure communication is very important.

The physical unclonable function (PUF) [30,31] is a function that can be embedded in an integrated circuit. The integrated circuit takes a bit string as input (or called challenge) and generates a random response string as the output. For various PUF modules manufactured on the same integrated circuit, no two PUF modules will produce the same response if faced with the same challenges. If a malicious attacker wants to change or destroy the PUF, it will change the corresponding internal circuit and logic gate delay. At this time, even if the same challenge is entered, the malicious attacker cannot obtain the same response. According to the microstructure and response of a given PUF, it is difficult for a malicious attacker to guess or infer the correct challenge. Moreover, the PUF is available on demand and does not require secure storage.

In this paper, a smart home authentication protocol using PUF and edge computing paradigm is proposed. The following are the novelty and contributions of this paper:

  • (1)

    To the best of our knowledge, we are the first to introduce an edge-computing-based smart home architecture and propose an authentication protocol based on this architecture. In our protocol, the user and the smart device realize mutual authentication with the help of the edge gateway and successfully establish a session key for secure communication.

  • (2)

    We apply PUF to smart devices to prevent data-leakage attacks launched by attackers, thus ensuring data security. According to the security properties of PUF, even if an attacker gets the same challenge, they cannot get the same response. Therefore, using PUF in our protocol can resist tampering and biological cloning attacks.

  • (3)

    We verify the security of our protocol by using the real or random (ROR) model, informal security analysis and simulation software (ProVerif). The results are shown that the proposed protocol can resist several well-known attacks.

  • (4)

    Finally, we compare our protocol with existing protocols regarding security and performance. The comparisons demonstrate that our protocol guarantees better security and slightly lower communication cost.

The remainder of this paper is structured as follows. The relevant research on smart homes, edge computing, and PUF is briefly reviewed in Section 2. In Section 3, we describe the system model and detailed protocol. We prove the security of our proposed protocol in Section 4. In Section 5, we compare our protocol with existing protocols in terms of security and performance. In Section 6, we set forth our conclusions.

2. Related Work

Many researchers proposed several authentication and key agreement (AKA) protocols in different environments. In 2008, Jeong et al. [32] proposed a lightweight user authentication protocol in the home network environment. This protocol could not guarantee the anonymity of users, and users were easily tracked. In addition, the protocol could not resist attacks by privileged insiders. Vaidya et al. [33] proposed a strong cryptographic-based AKA protocol in the home network environment. The author showed that this protocol has strong security. However, Kim et al. [34] performed cryptanalysis on the protocol of Vaidya et al. [33] and found that their protocol could not provide forward security and suffered from stolen smart card attacks. Kim et al. [34] indicated the security vulnerabilities of Vaidya et al.’s protocol [33] and proposed an enhanced AKA. Unfortunately, the protocol of Kim et al. [34] could not resist privileged insider attacks and was unable to guarantee users’ anonymity and untraceability. In 2017, Wazid et al. [35] proposed a lightweight AKA for remote users. They proved that their protocol was secure and had good performance. However, Lyu et al. [36] discovered that the protocol of Wazid et al. [35] was unable to withstand stolen verifier attacks and synchronization attacks. Lyu et al. [36] introduced IFTTT as a home gateway and used it as the executor and supervisor of commands. In 2019, Shuai et al. [37] proposed an efficient AKA protocol using elliptic curve cryptography (ECC) and showed that the protocol could resist existing attacks. However, Kaur and Kumar [38] found that Shuai et al.’s protocol [37] was vulnerable to insider attacks, replay attacks, and offline password guessing attacks. Subsequently, Kaur and Kumar [38] proposed a two-factor AKA protocol to enhance security. Unfortunately, Yu et al. [18] found that the protocol of Kaur and Kumar [38] could not resist impersonation attacks and session key disclosure attacks and proposed a secure AKA protocol based on three factors. However, Alzahrani et al. [39] discovered that Yu et al.’s protocol [18] was unable to achieve mutual authentication. Banerjee et al. [40] found that Shuai et al.’s protocol [37] could not resist stolen smart card attacks and user impersonation attacks and then proposed an efficient anonymous authentication protocol. Unfortunately, this protocol cannot guarantee the anonymity and untraceability of users [41]. Oh et al. [42] proposed an efficient authentication protocol using the hush function for IoT-based smart home environments. They proved that the protocol can resist known attacks.

In edge-computing environments, Tsai and Lo [43] proposed an authentication protocol using identity-based encryption technology. This protocol is based on bilinear pairing and the identity-based cryptosystem, which reduced the computation of users and servers. However, Jiang et al. [44] proved that the protocol of Tsai and Lo [43] was vulnerable to server impersonation attacks. Irshad et al. [45] also found that Tsai and Lo’s protocol [43] could not resist the de-synchronization attacks. They designed an improved multi-server authentication protocol and proved that the designed protocol could resist known attacks. However, Xiong et al. [46] pointed out that the protocol of Irshad et al. [45] lacked the registration and revocation of users and designed a new protocol. Later, Jia et al. [47] designed an identity-based authentication protocol. However, Li et al. [26] found that Jia et al.’s protocol [47] could not resist man-in-the-middle (MITM) attacks and then proposed a novel mobile edge computing environment architecture and designed a lightweight AKA protocol on this architecture. Unluckily, Li et al.’s protocol [26] cannot resist replay attacks and denial of service attacks. Kaur et al. [48] proposed a lightweight privacy-preserving AKA protocol, which adopts elliptic curve cryptography to resist various attacks, thus ensuring secure communication between entities.

Numerous PUF-based AKA protocols were recently proposed to address the aforementioned well-known security issues. Aysu et al. [49] proposed a secure and efficient end-to-end AKA protocol based on PUF between servers and resource-limited devices. Chatterjee et al. [50] designed a PUF-based AKA protocol for the IoT to realize authentication and secure information transfer between devices. Braeken [51] analyzed Chatterjee’s protocol [50] and found that it could not resist MITM attacks and replay attacks and proposed an efficient AKA protocol. Gope et al. [52] proposed a lightweight AKA protocol for user privacy protection in industrial wireless sensor networks. In this protocol, user and sensor nodes can authenticate and negotiate the session key with the aid of the gateway. Chen et al. [53] found that PUF-authentication protocols are vulnerable to machine learning attacks. Therefore, they adopted the concept of Shamir’s secret sharing to design an AKA protocol to resist the attacks. Ebrahimabadi et al. [54] designed a novel authentication protocol based on PUF and showed that the protocol has better security and efficiency. In order to ensure that users can obtain secure and timely services in a smart city environment, Yu et al. [55] proposed a lightweight authentication protocol based on PUF in an internet of drones environment. Shao et al. [56] proposed an AKA protocol using PUF in a wireless medical sensor environment with limited resources to ensure data security and patient privacy. Some significant relevant works are listed in Table 1.

Table 1.

The summary of authentication protocols.

Protocols Cryptographic Techniques and Properties Limitations
Yu et al. [18] (1) Utilized one-way hash function
(2) Utilized symmetric encryption
(1) Cannot provide mutual authentication
Jeong et al. [32] (1) Utilized one-way hash function
(2) Based on one-time password
(1) Cannot resist insider attacks
(2) Cannot guarantee user anonymity
Vaidya et al. [33] (1) Utilized one-way hash function
(2) Utilized symmetric encryption
(3) Utilized HMAC-based one-time password algorithm
(4) Based on smart card
(1) Cannot resist provide perfect forward security
(2) Cannot resist stolen smart card attacks
Wazid et al. [35] (1) Utilized one-way hash function
(2) Utilized symmetric encryption
(1) Cannot resist stolen verifier attacks
(2) Cannot resist synchronization attacks
Shuai et al. [37] (1) Utilized ECC
(2) Utilized one-way hash function
(3) Anonymity
(1) Cannot resist insider attacks
(2) Cannot resist replay attacks
(3) Cannot resist offline password guessing attacks
Kaur and Kumar [38] (1) Utilized one-way hash function
(2) Based on smart card
(3) Utilized ECC
(4) Two-factor
(1) Cannot resist impersonation attacks
(2) Cannot resist ssession key disclosure attacks
Jia et al. [47] (1) Utilized one-way hash function
(2) Utilized ECC
(3) Utilize bilinear pairing
(1) Cannot resist MITM attacks
Chen et al. [53] (1) Utilized one-way hash function
(2) Based on PUF
(3) Utilized Shamir’s secret sharing
Banerjee et al. [40] (1) Utilized one-way hash function (1) Cannot guarantee user anonymity and untraceability
Oh et al. [42] (1) Utilized one-way hash function
(2) Based on smart card

3. Proposed Protocol

In this section, an authentication protocol using PUF and the edge-computing paradigm for the smart home environment is proposed. Four entities, trusted third party TTP, edge gateway EGW, user Ui, and smart device SDj, are involved in our protocol. The system model is shown in Figure 2. Details on each entity are described below:

  • (1)

    Trusted third party TTP: TTP is a trusted entity, mainly responsible for the registration of home users and smart devices. Additionally, it stores a few users and smart device registration parameters in the edge gateway’s secure database.

  • (2)

    Edge gateway EGW: EGW is a trusted entity and is deployed in the home. EGW can collect data from various smart devices, process the data, and send the processed data to users who need data. It also serves as a bridge between smart devices and users.

  • (3)

    Home user Ui: Ui refers to the legal users who have successfully registered through TTP. With the help of the EGW, legal home users can enjoy the services provided by smart devices and remotely control them through mobile devices (such as smartphones, tablets, and smartwatches) anytime and anywhere.

  • (4)

    Smart device SDj: SDj deployed in the smart home environment (such as cameras, smart refrigerators, smart desk lamps, and smart locks) must be registered with TTP. Each smart device is embedded with a PUF module. In the smart home, it can execute the instructions transmitted by the user through the edge gateway and collect the data.

Figure 2.

Figure 2

System model.

Our protocol is divided into the registration, login and authentication phases. Before Ui and SDj are deployed in the smart home environment, TTP generates a master key x. Each SDj has a unique identity SMIDj and PUF module. The symbols used in the protocol are shown in Table 2, and the following thoroughly explains each phase.

Table 2.

Notations.

Notations Description
Ui ith user
SDj jth smart device
UIDi Identity of Ui
PIDi Pseudo-identities of Ui
UPWi Password of Ui
TTP Trusted third party
EGW Edge gateway
SMIDj Identity of SDj
x Private key of TTP
Gen(·) Fuzzy extractor probabilistic generation
Rep(·) Reproduction function
PUF(·) PUF function
SK Session key
h(·) Secure-hash function
|| Concatenation operation
XOR operation

3.1. Registration Phase

In the smart home environment, Ui and SDj must register with TTP via a secure channel. There are two phases of registration: Ui registration and SDj registration.

User Registration Phase. If Ui wants to enjoy smart home services, he or she must first register as a legal user in TTP. The process of Ui registration is shown in Figure 3. The steps of Ui registration are described in detail below.

Figure 3.

Figure 3

Ui registration phase.

  • (1)
    To begin with, Ui uses the mobile device to enter the identity UIDi, password UPWi, and selects a random number ai. Then, the mobile device calculates
    PIDi=h(UIDiai). (1)

    Finally, Ui passes {PIDi,UPWi,ai} to TTP through the secure channel.

  • (2)
    When TTP receives {PIDi,UPWi,ai}, first retrieves PIDi from the database of TTP. If retrieved in the database, TTP rejects the Ui’s registration. Or else, TTP calculates
    XUT=h(PIDiaix),R1=XUTh(UPWiai). (2)

    Thereafter, TTP calculation is completed, stores {PIDi} in its database, and stores {PIDi,XUT} in the secure database of EGW. Finally, TTP sends {R1} to Ui.

  • (3)
    When Ui receives {R1}, it calculates
    S1=aih(UIDiUPWi),Vi=h(PIDiRPWiai). (3)

    Finally, Ui stores {S1,R1,Vi} in the mobile device.

Smart Device Registration Phase.SDj must be registered at TTP before it can provide smart home services to Ui. The SDj registration process is shown in Figure 4. The following are the specific SDj registration process.

Figure 4.

Figure 4

SDj registration phase.

  • (1)
    Initially, SDj selects an identity SMIDj, generates a challenge Cj. Then, SDj calculates
    Rj=PUF(Cj),Gen(Rj)=(σj,δj). (4)

    Finally, SDj sends {SMIDj,Cj,δj} to TTP.

  • (2)
    After receiving {SMIDj,Cj,δj}, TTP retrieves SMIDj from the database. If not retrieved in the database, TTP calculates
    XST=h(SMIDjxδj). (5)

    Then, TTP stores {SMIDj} in its database and stores {SMIDj,Cj,δj,XST} in EGW’s security database. Finally, TTP sends {XST} to SDj.

  • (3)
    After receiving {XST}, SDj generates a random number bj, and then calculates
    S2=XSTh(SMIDjbj),S3=δjh(SMIDjbjXST). (6)

    Finally, SDj stores {S2,S3,bj} in memory.

3.2. Login and Authentication Phase

In this phase, all entities communicate via a public channel. With the help of the EGW, the legal Ui establishes a session key SK with the SDj. The established SK facilitates the Ui to safely obtain the service of the SDj and future communication. The detailed login and authentication process is shown in Figure 5. The steps of this process are described in detail below.

Figure 5.

Figure 5

Login and authentication phase.

  • (1)
    First, Ui uses the mobile device to input his own identity UIDi, password UPWi, and then calculates
    ai=h(UIDiUPWi)S1,PIDi=h(UIDiai),Vi*=h(PIDiRPWiai). (7)
    Next, Ui check Vi*=?Vi. If it holds, Ui successfully logs in. Otherwise, Ui will be denied login. Then, Ui calculates
    XUT=R1h(aiUPWi),RIDi=h(PIDiaiXUT). (8)
    Additionally, Ui selects unique identity SMIDj of the SDj, random number ri, and T1. Then, Ui calculates
    W1=(SMIDjri)h(XUTT1),W2=RIDiXUTT1,VUE=h(RIDiXUTriT1). (9)

    At last, Ui sends the message M1={W1,W2,PIDi,VUE,T1} through the public channel to EGW.

  • (2)
    When receiving M1 sent by Ui, EGW first checks |T1Ts|ΔT. If T1 is valid, EGW uses PIDi retrieve XUT from the secure database, and calculates
    (SMIDjri)=W1h(XUTT1),RIDi=W2XUTT1,VUE*=h(RIDiXUTriT1). (10)
    Next, EGW checks VUE*=?VUE. If it is correct, EGW authenticates SDj, and uses SMIDj retrieves {Cj,δj,XST} from the secure database. Then, EGW generates a timestamp T2, and calculates
    W3=(CjRIDiri)SMIDjδj,VED=h(RIDiδjXSTT2). (11)

    Eventually, EGW sends the message M2={W3,VED,T2} to SDj.

  • (3)
    When SDj receives M2 sent from EGW, first checks |T2Ts|ΔT. Then, SDj calculates
    XST=S2h(SMIDjbj),δj=S3h(SMIDjbjXST),(CjRIDiri)=W3SMIDjδj,VED*=h(RIDiδjXSTT2). (12)
    Next, SDj checks VED*=?VED. If it is correct, the identity of the EGW is authenticated, then SDj calculates
    σj=Rep(PUF(Cj),δj),PSMIDj=h(SMIDjσjXST). (13)
    Additionally, SDj generates rj and T3, then calculates
    SK=h((RIDiri)(PSMIDjrj)),W4=(PSMIDjrj)XSTδj,VDE=h(PSMIDjrjδjT3). (14)

    Finally, SDj sends the message M3={W4,VDE,T3} to EGW.

  • (4)
    When EGW receives M3 sent by SDj, first checks |T2Ts|ΔT. If T3 is valid, EGW calculates
    (PSMIDjrj)=W4XSTδj,VDE=h(PSMIDjrjδjT3). (15)
    Next, EGW checks VDE*=?VDE. If it is correct, EGW authenticates the SDj. Next, EGW generates a timestamp T4, and calculates
    W5=(PSMIDjrj)RIDiXUT,VEU=h(PSMIDjrjRIDiT4). (16)

    At last, EGW sends the message M4={W5,VEU,T4} to Ui.

  • (5)
    When receiving M4 sent by EGW, Ui first checks |T4Ts|ΔT. Then, Ui calculates
    (PSMIDjrj)=W5RIDiXUT,VEU*=h(PSMIDjrjRIDiT4). (17)
    Finally, Ui checks VEU*=?VEU. If the verification is successful, Ui calculates
    SK=h((RIDiri)(PSMIDjrj)). (18)

    The SK of the Ui and SDj is successfully established, indicating the complete login and authentication process.

4. Security Analysis

4.1. Formal Security Analysis

In this section, we verify the security of the proposed protocol by using the ROR [57,58,59] model. Under the ROR model, different rounds of games are set up to simulate whether an attacker (A) can crack the protocol in polynomial time and calculate the SK so as to verify the security of the proposed protocol.

Adversarial Model. In this paper, we use commonly used Dolev–Yao [60] and Canetti–Krawczyk [61] models. The following describes the capabilities of A in the above model.

  • (1)

    A can eavesdrop, update, delete, intercept and modify information in the public channel.

  • (2)

    A can steal the Ui’s mobile device and then through physical analysis to obtain Ui’s private information stored in the mobile device [62].

  • (3)

    Through a dictionary attack, A can guess the Ui’s identity or password, but A cannot simultaneously speculate Ui’s identity and password.

  • (4)

    A can obtain the temporary value of any entity.

  • (5)

    A cannot access information stored in the EGW security database.

Security Model. The proposed protocol involves Ui, EGW, and SDj. We define ΠUix, ΠEGWy, and ΠSDjz represents the x-th Ui instance, the y-th EGW instance, and the z-th SDj instance respectively. Here, assume that the A can implement the following operations under the ROR model.

  • (1)

    Execute(E): A can eavesdrop on messages transmitted between entities, where E = {ΠUix, ΠGWy,ΠDjz}.

  • (2)

    Send(E,Mi): A sends the message Mi to E and get E’s response.

  • (3)

    Hash(string): A enters a string and obtain the string’s hash value.

  • (4)

    Corrupt(ΠUix): A can get Ui information stored in the mobile device.

  • (5)

    Test(E): A guesses the correct SK by flipping the coin C. If C = 1, A can obtain the correct SK. If C = 0, A can obtain a random string with the same length as the SK.

According to both models, we adopt Theorem 1 to show the security of our proposed protocol.

Theorem 1.

Under the ROR model, the advantages of the A’s ability to break the proposed protocol in polynomial time ξ are: AdvAP(ξ)qh2|Hash|+qs2|PUF|+2C·qsends. Here, qh refers to the number of hash operations performed, |Hash| refers to the space of the hash function, |PUF| refers to the PUF function, and C and s refer to two constants.

Proof 

We defined five games: GM0-GM4 to simulate the process of A attacking our proposed protocol. In the process of proof, SuccAGMi(ξ) is defined as the probability of A winning in GMi, AdvAP is defined as the advantage of A to crack the protocol. The specific proof steps are as follows:

GM0: In GM0, A starts the game by tossing a coin C and does not perform any operation in the game. Therefore, we can obtain

AdvAP(ξ)=|2Pr[SuccAGM0(ξ)]1|. (19)

GM1: By executing Execute(E), A can eavesdrop M1={W1,W2,PIDi,VUE,T1}, M2={W3,VED,T2}, M3={W4,VDE,T3}, and M4={W5,VEU,T4}. When GM1 at the end of the session, calculate the SK by executing Test() query, where SK=h((RIDiri)(PSMIDjrj)). However, A cannot obtain values {RIDi,PSMIDj,ri,rj}, so A cannot calculate SK. Therefore, there is no difference between the probabilities of GM1 and GM0:

Pr[SuccAGM1(ξ)]=Pr[SuccAGM0(ξ)]. (20)

GM2: Add Send() operation and Hash() operation in GM2. Because the authentication values {VUE,VED,VDE,VEU} are composed of the private value generated by each entity and is secured by the hash function, so A cannot tamper with the message. In addition, the random number in the authentication value is different in each session, so a hash collision does not occur. Therefore, according to the birthday paradox, we can obtain

|Pr[SuccAGM2(ξ)]Pr[SuccAGM1(ξ)]|qh22|Hash|. (21)

GM3: In GM3, the difference from GM2 is to delete the Hash() operation and add PUF query. As described in Section 1, according to the security attributes of the PUF (·), we can obtain the probability of GM3 as

|Pr[SuccAGM3(ξ)]Pr[SuccAGM2(ξ)]|qs2|PUF|. (22)

GM4: In GM4, A obtains the information {A1,R1,Vi} in the mobile device by executing the Corrupt() query, and attempts to exploit the offline password guessing attacks to obtain the user’s correct password UPWi. Since A cannot obtain the Ui’s PIDi and random number ai. The Ui’s password cannot be guessed. Therefore, according to Zipf’s law [63], we can conclude that

|Pr[SuccAGM4(ξ)]Pr[SuccAGM3(ξ)]|C·qsends (23)

Finally, A can only guess bit C to obtain the correct SK so as to win the game. Therefore, we can obtain

AdvAP(ξ)2=|Pr[SuccAGM0(ξ)]12=|Pr[SuccAGM0(ξ)]Pr[SuccAGM4(ξ)]|=|Pr[SuccAGM1(ξ)]Pr[SuccAGM4(ξ)]|i=03|Pr[SuccAGMi+1(ξ)]Pr[SuccAGMi(ξ)]|=qh22|Hash|+qs22|PUF|+C·qsends (24)

Finally, we can conclude that

AdvAP(ξ)qh2|Hash|+qs2|PUF|+2C·qsends (25)

4.2. Informal Security Analysis

MITM Attacks. It is assumed that A can intercept all information transmitted in the public channel. Let us take message M2 as an example, message M2 contains the authentication value VED=h(RIDiδjXSTT2), A tried to tamper with the value of VED, but A does not know RIDi, δj, and XST, so A cannot tamper with the authentication value VED. Similarly, A cannot tamper with the message M1, M3, and M4. Therefore, evil intermediaries cannot break our protocol.

Smart Device Stolen Attacks. Suppose A obtains the information {S2,S3,bj}, which is stored in the memory of Sj. Since each Sj is embedded with a PUF module, A is unable obtain the value of δj and A cannot calculate PSMIDj. Similarly, A cannot calculate RIDi and ri, so A is incapable of successfully calculating SK. Thus, our protocol can resist smart device stolen attacks.

Temporary Value Disclosure Attacks. Suppose A can obtain the random number generated in any entity. Let us take A can obtain ri generated by Ui as an example, where SK=h((RIDiri)(PSMIDjrj)). Although A can intercept messages in the public channel, A cannot know RIDi, PSMIDj and rj, so A cannot figure out the correct SK. Similarly, even if A obtains rj generated by Sj, it cannot figure out the correct SK. Therefore, even if A obtains the random number of any entity, it cannot break our protocol.

Replay Attacks. In our proposed protocol, each message delivered in the public channel contains a timestamp. When each entity receives a message, it first checks whether the timestamp is valid. The entity will perform subsequent calculations if the timestamp is within the valid range. Here, take message M2={W3,VED,T2} as an example. Suppose A intercepts the message M2 and sends M2 to Sj repeatedly. When Sj receiving M2 sent by A, Sj first checks |T2Ts|ΔT. Sj will terminate the session because the timestamp in message M2 is not within the valid time range. Consequently, our proposed protocol can withstand replay attacks.

Mutual Authentication. In our proposed protocol, the validity of the entity is verified by the authentication value. The message passed in the public channel contains the authentication value, wherein

VUE=h(RIDiXUTriT1),VED=h(RIDiδjXSTT2),VDE=h(PSMIDjrjRIDiT3),VEU=h(PSMIDjrjRIDiT4). (26)

EGW through calculation of VUE verify the validity of Ui, Sj through calculation of VED verify the validity of EGW, EGW through calculation of VDE verify the validity of Sj, Ui through calculation of VEU verify the validity of EGW. Therefore, our protocol can ensure that each entity realizes mutual authentication.

Anonymity and Untraceability. In our proposed protocol, random numbers and hash functions are used to hide the real identities of Ui and Sj. The pseudonym of Ui and Sj are used in the authentication process. Even if the attacker intercepts the messages M1, M2, M3 and M4 transmitted in the public channel, it cannot track the Ui and Sj. In addition, random numbers are different during each session, ensuring that Ui and Sj are not traceable. As a result, the proposed protocol can guarantee the anonymity and untraceability of entities.

4.3. ProVerif

ProVerif [64,65] is a formal simulation tool developed by Bruno Blanchett for automatically verifying cryptographic protocols. It describes cryptographic primitives, such as hash functions, fuzzy extraction, etc. In this paper, we use ProVerif software to simulate the smart home environment, mainly by executing code to simulate the registration and authentication process of Ui, EGW, TTP, and SDj to verify the security of our protocol.

The symbols and operations used in ProVerif are defined in Figure 6a. We use ProVerif to query whether A can calculate SK through the information transmitted on the public channel. Our proposed protocol proof includes six events: event UserStarted(), event UserAuthed(), event EGWAcUser(), event SmartdeviceAcEGW(), event EGWAcSmartdevice(), and event UserAcEGW(), which indicate that Ui starts authentication, Ui completes authentication, EGW completes the authentication of the Ui, SDj completes the authentication of the EGW, EGW completes the authentication of SDj, and Ui completes the authentication of the EGW. The specific query and event definitions are shown in Figure 6b.

Figure 6.

Figure 6

Simulation process in ProVerif. (a) Definitions; (b) the queries and events; (c) execution process of Ui; (d) execution process of SDj; (e) execution process of TTP and EGW; (f) verification results.

The process of ProVerif simulating Ui, SDj, TTP, and EGW in Figure 6c–e. TTP includes two sub-processes: Ui registration and SDj registration. “UiReg” represents the user registration phase, and “SDjReg” represents the smart device registration phase. ProVerif describes the detailed steps of each entity, such as the definition of new parameters and sending and receiving messages. Take the Ui process as an example, where “new UIDi: bitstring” represents the definition of the Ui identity, “out (sch, (PIDi, UPWi, ai))” represents that the Ui sends messages to EGW, and “in (sch, (xR1: bitstring))” means that the Ui receives messages sent from EGW. Finally, we use ProVerif to verify the proposed protocol, as shown in Figure 6f. We can conclude from the results that A cannot calculate SK, which proves that we propose a secure protocol.

According to the presentations in Section 4.1, Section 4.2 and Section 4.3, we demonstrated the security of our protocol in terms of formal proof (using RoR model), informal proof, and simulation software (ProVerif). The results show that the proposed authentication protocol can resist several well-known attacks, such as insider, gateway impersonation, session key disclosure, offline password guessing, and replay, and provides mutual authentication, anonymity, and untraceability.

5. Security and Performance Comparisons

In this section, we compare the proposed protocol with four existing related protocols [18,37,40,42] in terms of security and performance.

5.1. Security Comparisons

We compare the security of our proposed protocol with that of Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42]. Table 3 shows the security comparison results. ✓ demonstrates that the protocol can resist this attack, and × demonstrates that the protocol suffers from this attack. Shuai et al.’s protocol [37] suffers from insider attacks, gateway impersonation attacks, session key disclosure attacks, offline password guessing attacks, and replay attacks. Banerjee et al.’s protocol [40] cannot provide anonymity and untraceability. Yu et al.’s protocol [18] is unable to provide mutual authentication. Oh et al. [42] and our protocol can resist these attacks.

Table 3.

Comparison of security.

Security Properties [37] [40] [18] [42] Ours
Insider Attacks ×
Gateway Impersonation Attacks ×
Session Key Disclosure Attacks ×
Offline Password Guessing Attacks ×
Replay Attacks ×
Mutual Authentication ×
Anonymity and untraceability × × × ×

5.2. Performance Comparisons

We compare the performance from two aspects: computational cost and communication cost.

5.2.1. Computational Cost Comparisons

We compare and analyze the computational costs of each protocol in the login and authentication phase. Additionally, we perform simulation experiments to evaluate the computational cost of the protocol. We use HONOR Play3 to simulate users, Lenovo desktop to simulate edge gateway, and Lenovo laptop to simulate smart devices. The specific configuration of these three devices is shown in Table 4, where the operation time is obtained by averaging 20 times of operation. Here we will ignore hash and join operations. We can see the comparison results of the computational cost from Table 5. Because the running time of the fuzzy extractor is almost the same as that of the hash function, we use the hash function’s running time to represent the fuzzy extractor’s running time in the calculation cost comparison.

Table 4.

Configuration parameters and running time of equipment.

HONOR Play3 Lenovo Desktop Lenovo Laptop
Operating System Android System Windows 10 Windows 10
Running Memory 4G 16G 8G
CPU HUAWEI Kirin 710F Intel(R) Core(TM) i5- Intel(R) Core(TM) i7-
9500 CPU @ 3.00 GHz 6700HQ CPU @ 2.60 GHz
Hash Function 0.0041 ms 0.0024 ms 0.0035 ms
Point Multiplication 0.5354 ms 0.3354 ms 0.4129 ms
Point Addition 0.1604 ms 0.0633 ms 0.0977 ms
Table 5.

Computational cost comparison.

Protocols Ui (ms) EGW (ms) SDj (ms)
Shuai et al. [37] 2TC+6TH1.095 TC+7TH0.556 3TH0.012
Banerjee et al. [40] 10TH+TP0.045 9TH0.22 4TH0.014
Yu et al. [18] TD+12TH+TP0.309 11TH0.045 7TH0.029
Oh et al. [42] 16TH0.066 15TH0.036 8TH0.028
Our 9TH0.037 5TH0.020 6TH+TP0.029

Here, TC represents the execution time of ECC point multiplication, TD represents the execution time of symmetric encryption/decryption operation, TH represents the running time of hash function, and TP represents the execution time of the fuzzy extraction function.

In the framework of the smart home environment, there can be multiple Ui and SDj and only one edge gateway. We describe the relationship between the change in the number of entities and the calculated cost as follows. The relationship between the number of Ui and the computational cost is shown in Figure 7. Shuai et al. [37] used point multiplication in the protocol, so the computational cost of this protocol is higher than that of other protocols. Yu et al. [18] used symmetric key encryption/decryption and fuzzy extractor in the protocol, and its computational cost is lower than that of Shuai et al. [37]. Moreover, the computational cost of other protocols is not different. The computational cost of EGW is shown in Figure 8. We can conclude from Figure 8 that the EGW computational cost of the proposed protocol is lower than that of other protocols. The relationship between the number of SDj and the computational cost is shown in Figure 9. We can conclude from Figure 9 that the SDj computational cost of the proposed protocol is lower than that of Oh et al.’s protocol [42], the same as that of Yu et al.’s protocol [18], but slightly higher than that of other protocols.

Figure 7.

Figure 7

The computational cost of users. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].

Figure 8.

Figure 8

The computational cost of EGW. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].

Figure 9.

Figure 9

The computational cost of smart devices. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].

5.2.2. Communication Cost Comparisons

This part assumes that the length of timestamp, random number, identity, hash function, point multiplication, and symmetric encryption/decryption are 32, 128, 160, 256, 320, and 256 bits. Take our protocol as an example to explain the calculation process of communication cost. In our protocol, the messages transmitted in the public channel are M1={W1,W2,PIDi,VUE,T1}, M2={W3,VED,T2}, M3={W4,VDE,T3}, M4={W5,VEU,T4}. Where, PIDi is the identity, {W1,W2,W3,W4,W5} are random numbers, {VUE,VED,VDE,VEU} are hash functions, {T1,T2,T3,T4} are time stamps. It is calculated that the communication cost of our protocol is 1952 bits. The communication costs of Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42] are 2016, 1696, 1792, and 2368 bits, respectively. We can draw a conclusion from Table 6 and Figure 10 that the communication cost of the proposed protocol is lower than that of Shuai et al. [37] and Oh et al. [42], and slightly higher than that of Banerjee et al. [40] and Yu et al. [18].

Table 6.

Communication cost comparison.

Protocols Rounds Communication Cost
Shuai et al. [37] 4 2016 bits
Banerjee et al. [40] 4 1696 bits
Yu et al. [18] 4 1792 bits
Oh et al. [42] 5 2368 bits
Our 4 1952 bits
Figure 10.

Figure 10

Comparisons of communication cost. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].

6. Conclusions

Communication security is an essential factor for the sustainable development of smart homes. It ensures that users can obtain secure smart home services and protects users’ privacy. Due to the openness of wireless channels prone to data leakage, using cryptographic methods to ensure communication security has attracted many researchers’ attention. To the best of our knowledge, we introduce the first edge-computing-based smart home architecture. Meanwhile, based on this architecture, a PUF-based authentication protocol is proposed. Precisely, the properties of PUF are provided to resist physical tampering and biological cloning attacks. The standard security verification approaches which are formal security analysis using RoR model, informal security analysis, and ProVerif simulation software are made to demonstrate the security of our protocol. The security and performance comparisons are indicated that our protocol has higher security and slightly better performance. In the future, we will adopt several lightweight cryptographic operations to design the new authentication protocol in smart home environments. Without loss of security, the new protocol is more suitable for users’ IoT devices.

Abbreviations

The following abbreviations are used in this manuscript:

IoT Internet of Things
ROR Real or random
RA Registration authority
PUF Physical unclonable functions
AKA Authentication and key agreement
ECC Elliptic curve cryptography

Author Contributions

Conceptualization, T.-Y.W.; methodology, T.-Y.W. and F.K.; software, L.W.; formal analysis, Y.-C.C.; investigation, S.K. and J.-S.P.; writing—original draft preparation, T.-Y.W., F.K., L.W., Y.-C.C., S.K. and J.-S.P. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data is included in the article.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

This research received no external funding.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Chen X., Zhang J., Lin B., Chen Z., Wolter K., Min G. Energy-efficient offloading for DNN-based smart IoT systems in cloud-edge environments. IEEE Trans. Parallel Distrib. Syst. 2021;33:683–697. doi: 10.1109/TPDS.2021.3100298. [DOI] [Google Scholar]
  • 2.Shen S., Yang Y., Liu X. Toward data privacy preservation with ciphertext update and key rotation for IoT. Concurr. Comput. Prac. Exp. 2021:e6729. doi: 10.1002/cpe.6729. [DOI] [Google Scholar]
  • 3.Namasudra S. A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure. Comput. Electr. Eng. 2022;104:108426. doi: 10.1016/j.compeleceng.2022.108426. [DOI] [Google Scholar]
  • 4.Wu T.Y., Meng Q., Kumari S., Zhang P. Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments. Sensors. 2022;22:3858. doi: 10.3390/s22103858. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 5.Yu Z., Zheng X., Huang F., Guo W., Sun L., Yu Z. A framework based on sparse representation model for time series prediction in smart city. Front. Comput. Sci. 2021;15:1–13. doi: 10.1007/s11704-019-8395-7. [DOI] [Google Scholar]
  • 6.Huang H., Lu S., Wu Z., Wei Q. An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2021;2021:1–21. doi: 10.1186/s13638-021-02022-1. [DOI] [Google Scholar]
  • 7.Luo Y., Zheng W.M., Chen Y.C. An anonymous authentication and key exchange protocol in smart grid. J. Netw. Intell. 2021;6:206–215. [Google Scholar]
  • 8.Liu S., Chen C.M. Comments on “A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance”. IEEE Trans. Intell. Transp. Syst. 2022 doi: 10.1109/TITS.2022.3198045. [DOI] [Google Scholar]
  • 9.Yang Y., Zheng X., Guo W., Liu X., Chang V. Privacy-preserving fusion of IoT and big data for e-health. Future Gener. Comput. Syst. 2018;86:1437–1455. doi: 10.1016/j.future.2018.01.003. [DOI] [Google Scholar]
  • 10.Wu T.Y., Yang L., Luo J.N., Ming-Tai Wu J. A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments. Secur. Commun. Netw. 2021:2299632. doi: 10.1155/2021/2299632. [DOI] [Google Scholar]
  • 11.Das S., Namasudra S. MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure. Int. J. Netw. Manag. 2022 doi: 10.1002/nem.2200. [DOI] [Google Scholar]
  • 12.Jiang Q., Zhang X., Zhang N., Tian Y., Ma X., Ma J. Two-factor authentication protocol using physical unclonable function for IoV; Proceedings of the 2019 IEEE/CIC International Conference on Communications in China (ICCC); Changchun, China. 11–13 August 2019; pp. 195–200. [DOI] [Google Scholar]
  • 13.Yu S., Lee J., Park K., Das A.K., Park Y. IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access. 2020;8:167875–167886. doi: 10.1109/ACCESS.2020.3022778. [DOI] [Google Scholar]
  • 14.Chaudhry S.A. Combating identity de-synchronization: An improved lightweight symmetric key based authentication scheme for IoV. J. Netw. Intell. 2021;6:656–667. [Google Scholar]
  • 15.Kumar V., Kumar R., Kumar V., Kumari A., Kumari S. RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing. J. Netw. Intell. 2022;7:526–543. [Google Scholar]
  • 16.Li Z., Miao Q., Chaudhry S.A., Chen C.M. A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. Int. J. Distrib. Sens. Netw. 2022;18:15501329221104332. doi: 10.1177/15501329221104332. [DOI] [Google Scholar]
  • 17.Naoui S., Elhdhili M.E., Saidane L.A. Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J. Netw. Syst. Manag. 2019;27:1020–1042. doi: 10.1007/s10922-019-09496-x. [DOI] [Google Scholar]
  • 18.Yu S., Jho N., Park Y. Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes. IEEE Access. 2021;9:126186–126197. doi: 10.1109/ACCESS.2021.3111443. [DOI] [Google Scholar]
  • 19.Tanveer M., Abbas G., Abbas Z.H., Bilal M., Mukherjee A., Kwak K.S. LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes. IEEE Internet Things J. 2021;9:2578–2591. doi: 10.1109/JIOT.2021.3085595. [DOI] [Google Scholar]
  • 20.Xue X., Jiang C. Matching sensor ontologies with multi-context similarity measure and parallel compact differential evolution algorithm. IEEE Sens. J. 2021;21:24570–24578. doi: 10.1109/JSEN.2021.3115471. [DOI] [Google Scholar]
  • 21.Xue X., Huang Q. Generative adversarial learning for optimizing ontology alignment. Expert Syst. 2022 doi: 10.1111/exsy.12936. [DOI] [Google Scholar]
  • 22.Yang Y., Zheng X., Chang V., Ye S., Tang C. Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimed. Tools Appl. 2018;77:9927–9941. doi: 10.1007/s11042-017-4560-x. [DOI] [Google Scholar]
  • 23.Zhang J., Li M., Chen Z., Lin B. Computation offloading for object-oriented applications in a UAV-based edge-cloud environment. J. Supercomput. 2022;78:10829–10853. doi: 10.1007/s11227-021-04288-0. [DOI] [Google Scholar]
  • 24.Wu T.Y., Wang L., Guo X., Chen Y.C., Chu S.C. SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing. Sustainability. 2022;14:11054. doi: 10.3390/su141711054. [DOI] [Google Scholar]
  • 25.Cao K., Liu Y., Meng G., Sun Q. An overview on edge computing research. IEEE Access. 2020;8:85714–85728. doi: 10.1109/ACCESS.2020.2991734. [DOI] [Google Scholar]
  • 26.Li Y., Cheng Q., Liu X., Li X. A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst. J. 2020;15:935–946. doi: 10.1109/JSYST.2020.2979006. [DOI] [Google Scholar]
  • 27.Chen X., Chen S., Ma Y., Liu B., Zhang Y., Huang G. An adaptive offloading framework for android applications in mobile edge computing. Sci. China Inf. Sci. 2019;62:1–17. doi: 10.1007/s11432-018-9749-8. [DOI] [Google Scholar]
  • 28.Liu G., Chen X., Zhou R., Xu S., Chen Y.C., Chen G. Social learning discrete Particle Swarm Optimization based two-stage X-routing for IC design under Intelligent Edge Computing architecture. Appl. Soft Comput. 2021;104:107215. doi: 10.1016/j.asoc.2021.107215. [DOI] [Google Scholar]
  • 29.Wu T.Y., Meng Q., Yang L., Guo X., Kumari S. A provably secure lightweight authentication protocol in mobile edge computing environments. J. Supercomput. 2022;78:13893–13914. doi: 10.1007/s11227-022-04411-9. [DOI] [Google Scholar]
  • 30.Pappu R., Recht B., Taylor J., Gershenfeld N. Physical one-way functions. Science. 2002;297:2026–2030. doi: 10.1126/science.1074376. [DOI] [PubMed] [Google Scholar]
  • 31.Tahavori M., Moazami F. Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. Peer-to-Peer Netw. Appl. 2020;13:1616–1628. doi: 10.1007/s12083-020-00911-8. [DOI] [Google Scholar]
  • 32.Jeong J., Chung M.Y., Choo H. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks; Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008); Walkoloa, HI, USA. 7–10 January 2008; p. 294. [DOI] [Google Scholar]
  • 33.Vaidya B., Park J.H., Yeo S.S., Rodrigues J.J. Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 2011;34:326–336. doi: 10.1016/j.comcom.2010.03.013. [DOI] [Google Scholar]
  • 34.Kim H.J., Kim H.S. AUTH HOTP-HOTP based authentication scheme over home network environment; Proceedings of the International Conference on Computational Science and Its Applications; Santander, Spain. 20–23 June 2011; pp. 622–637. [DOI] [Google Scholar]
  • 35.Wazid M., Das A.K., Odelu V., Kumar N., Susilo W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secur. Comput. 2017;17:391–406. doi: 10.1109/TDSC.2017.2764083. [DOI] [Google Scholar]
  • 36.Lyu Q., Zheng N., Liu H., Gao C., Chen S., Liu J. Remotely access “my” smart home in private: An anti-tracking authentication and key agreement scheme. IEEE Access. 2019;7:41835–41851. doi: 10.1109/ACCESS.2019.2907602. [DOI] [Google Scholar]
  • 37.Shuai M., Yu N., Wang H., Xiong L. Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 2019;86:132–146. doi: 10.1016/j.cose.2019.06.002. [DOI] [Google Scholar]
  • 38.Kaur D., Kumar D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J. Inf. Secur. Appl. 2021;58:102787. doi: 10.1016/j.jisa.2021.102787. [DOI] [Google Scholar]
  • 39.Alzahrani B.A., Barnawi A., Albarakati A., Irshad A., Khan M.A., Chaudhry S.A. SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes. Wirel. Commun. Mob. Comput. 2022;2022:8669941. doi: 10.1155/2022/8669941. [DOI] [Google Scholar]
  • 40.Banerjee S., Odelu V., Das A.K., Chattopadhyay S., Park Y. An efficient, anonymous and robust authentication scheme for smart home environments. Sensors. 2020;20:1215. doi: 10.3390/s20041215. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 41.Fadi A.T., Deebak B.D. Seamless authentication: For IoT-big data technologies in smart industrial application systems. IEEE Trans. Ind. Inform. 2020;17:2919–2927. [Google Scholar]
  • 42.Oh J., Yu S., Lee J., Son S., Kim M., Park Y. A secure and lightweight authentication protocol for IoT-based smart homes. Sensors. 2021;21:1488. doi: 10.3390/s21041488. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 43.Tsai J.L., Lo N.W. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 2015;9:805–815. doi: 10.1109/JSYST.2014.2322973. [DOI] [Google Scholar]
  • 44.Jiang Q., Ma J., Wei F. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 2016;12:2039–2042. doi: 10.1109/JSYST.2016.2574719. [DOI] [Google Scholar]
  • 45.Irshad A., Sher M., Ahmad H.F., Alzahrani B.A., Chaudhry S.A., Kumar R. An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. (TIIS) 2016;10:5529–5552. [Google Scholar]
  • 46.Xiong L., Peng D., Peng T., Liang H. An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. (TIIS) 2017;11:6169–6187. [Google Scholar]
  • 47.Jia X., He D., Kumar N., Choo K.K.R. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 2019;14:560–571. doi: 10.1109/JSYST.2019.2896064. [DOI] [Google Scholar]
  • 48.Kaur K., Garg S., Kaddoum G., Guizani M., Jayakody D.N.K. A lightweight and privacy-preserving authentication protocol for mobile edge computing; Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM); Waikoloa, HI, USA. 9–13 December 2019; pp. 1–6. [DOI] [Google Scholar]
  • 49.Aysu A., Gulcan E., Moriyama D., Schaumont P., Yung M. End-to-end design of a PUF-based privacy preserving authentication protocol; Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems; Saint-Malo, France. 13–16 September 2015; pp. 556–576. [DOI] [Google Scholar]
  • 50.Chatterjee U., Chakraborty R.S., Mukhopadhyay D. A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 2017;16:1–25. doi: 10.1145/3005715. [DOI] [Google Scholar]
  • 51.Braeken A. PUF based authentication protocol for IoT. Symmetry. 2018;10:352. doi: 10.3390/sym10080352. [DOI] [Google Scholar]
  • 52.Gope P., Das A.K., Kumar N., Cheng Y. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 2019;15:4957–4968. doi: 10.1109/TII.2019.2895030. [DOI] [Google Scholar]
  • 53.Chen S., Li B., Chen Z., Zhang Y., Wang C., Tao C. Novel Strong-PUF-based Authentication Protocols Leveraging Shamir’s Secret Sharing. IEEE Internet Things J. 2021;9:14408–14425. doi: 10.1109/JIOT.2021.3065836. [DOI] [Google Scholar]
  • 54.Ebrahimabadi M., Younis M., Karimi N. A PUF-based modeling-attack resilient authentication protocol for IoT devices. IEEE Internet Things J. 2021;9:3684–3703. doi: 10.1109/JIOT.2021.3098496. [DOI] [Google Scholar]
  • 55.Yu S., Das A.K., Park Y., Lorenz P. SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments. IEEE Trans. Veh. Technol. 2022;71:10374–10388. doi: 10.1109/TVT.2022.3188769. [DOI] [Google Scholar]
  • 56.Shao X., Guo Y., Guo Y. A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wirel. Netw. 2022;28:3753–3770. doi: 10.1007/s11276-022-03070-1. [DOI] [Google Scholar]
  • 57.Abdalla M., Fouque P.A., Pointcheval D. Proceedings of the International Workshop on Public Key Cryptography. Springer; Berlin/Heidelberg, Germany: 2005. Password-based authenticated key exchange in the three-party setting; pp. 65–84. [DOI] [Google Scholar]
  • 58.Wu T.Y., Lee Z., Yang L., Luo J.N., Tso R. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J. Supercomput. 2021;77:6992–7020. doi: 10.1007/s11227-020-03548-9. [DOI] [Google Scholar]
  • 59.Wu T.Y., Meng Q., Yang L., Kumari S., Nia M.P. Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment. Comput. Model. Eng. Sci. 2023;134:317–341. doi: 10.32604/cmes.2022.019595. [DOI] [Google Scholar]
  • 60.Dolev D., Yao A. On the security of public key protocols. IEEE Trans. Inf. Theory. 1983;29:198–208. doi: 10.1109/TIT.1983.1056650. [DOI] [Google Scholar]
  • 61.Canetti R., Krawczyk H. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer; Berlin/Heidelberg, Germany: 2001. Analysis of key-exchange protocols and their use for building secure channels; pp. 453–474. [DOI] [Google Scholar]
  • 62.Messerges T.S., Dabbish E.A., Sloan R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002;51:541–552. doi: 10.1109/TC.2002.1004593. [DOI] [Google Scholar]
  • 63.Wang D., Cheng H., Wang P., Huang X., Jian G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017;12:2776–2791. doi: 10.1109/TIFS.2017.2721359. [DOI] [Google Scholar]
  • 64.Blanchet B. An efficient cryptographic protocol verifier based on prolog rules; Proceedings of the 14th IEEE Computer Security Foundations Workshop; Cape Breton, NS, Canada. 11–13 June 2001; pp. 82–96. [Google Scholar]
  • 65.Yang L., Chen Y.C., Wu T.Y. Provably Secure Client-Server Key Management Scheme in 5G Networks. Wirel. Commun. Mob. Comput. 2021:4083199. doi: 10.1155/2021/4083199. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The data is included in the article.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES