基于物理不可克隆功能的单元物联网和泛在物联网认证协议

Min Zhao, Xuanxia Yao, Hong Liu, Huansheng Ning
{"title":"基于物理不可克隆功能的单元物联网和泛在物联网认证协议","authors":"Min Zhao, Xuanxia Yao, Hong Liu, Huansheng Ning","doi":"10.1109/IIKI.2016.85","DOIUrl":null,"url":null,"abstract":"Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.","PeriodicalId":371106,"journal":{"name":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Physical Unclonable Function Based Authentication Protocol for Unit IoT and Ubiquitous IoT\",\"authors\":\"Min Zhao, Xuanxia Yao, Hong Liu, Huansheng Ning\",\"doi\":\"10.1109/IIKI.2016.85\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.\",\"PeriodicalId\":371106,\"journal\":{\"name\":\"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)\",\"volume\":\"15 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIKI.2016.85\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIKI.2016.85","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

单元与泛在物联网(U2IoT)是实现泛在物全面交互的典型物联网架构。在U2IoT中,由于对象的交互阶段复杂,安全性成为一个具有挑战性的问题。对象从物理空间映射到网络空间的不同阶段具有不同的安全需求。在这项工作中,首先提出了对象生命周期(OLC)的概念,以描述U2IoT中对象的物理访问、网络实体和物理消失阶段的安全要求。同时,考虑到对象的多样性和相关资源的多样性,引入物理不可克隆功能(Physical unclable Function, PUF),为智能家居场景设计轻量级的互认证协议。基于ban逻辑,验证了设计的正确性和形式安全性。说明提出的协议满足对象在物理访问阶段的主要安全需求。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Physical Unclonable Function Based Authentication Protocol for Unit IoT and Ubiquitous IoT
Unit and Ubiquitous IoT (U2IoT) is a typical IoT architecture for achieving comprehensive interactions of ubiquitous things. In U2IoT, security becomes a challenging issue due to objects' complicated interactive phases. The object in different phases of being mapped from the physical space to the cyber space has different security requirements. In this work, a concept of Object Life Cycle (OLC) is first proposed to describe the security requirements for the objects' physical access, cyberentity, and physical extinction phase in U2IoT. Meanwhile, considering the variety of objects and related diversity resources, Physical Unclonable Function (PUF) is introduced to design a lightweight mutual authentication protocol for a smart home scenario. The design correctness and formal security are proved based on the BAN-logic. It indicates that the proposed protocol satisfies the main security requirements for the object during the physical access phase.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信