内部攻击防范:LAPUP--使用 PUF 的轻量级身份验证协议

Siranjeevi Rajamanickam;Satyanarayana Vollala;N. Ramasubramanian
{"title":"内部攻击防范:LAPUP--使用 PUF 的轻量级身份验证协议","authors":"Siranjeevi Rajamanickam;Satyanarayana Vollala;N. Ramasubramanian","doi":"10.23919/JCIN.2024.10582825","DOIUrl":null,"url":null,"abstract":"The incredible progress in technologies has drastically increased the usage of Web applications. Users share their credentials like userid and password or use their smart cards to get authenticated by the application servers. Smart cards are handy to use, but they are susceptible to stolen smart card attacks and few other notable security attacks. Users prefer to use Web applications that guarantee for security against several security attacks, especially insider attacks, which is crucial. Cryptanalysis of several existing schemes prove the security pitfalls of the protocols from preventing security attacks, specifically insider attacks. This paper introduces LAPUP: a novel lightweight authentication protocol using physically unclonable function (PUF) to prevent security attacks, principally insider attacks. The PUFs are used to generate the security keys, challenge-response pair (CRP) and hardware signature for designing the LAPUP. The transmitted messages are shared as hash values and encrypted by the keys generated by PUF. These messages are devoid of all possible attacks executed by any attacker, including insider attacks. LAPUP is also free from stolen verifier attacks, as the databases are secured by using the hardware signature generated by PUFs. Security analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security attacks. The evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols, despite providing enhanced security.","PeriodicalId":100766,"journal":{"name":"Journal of Communications and Information Networks","volume":"9 2","pages":"192-206"},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10582825","citationCount":"0","resultStr":"{\"title\":\"Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF\",\"authors\":\"Siranjeevi Rajamanickam;Satyanarayana Vollala;N. Ramasubramanian\",\"doi\":\"10.23919/JCIN.2024.10582825\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The incredible progress in technologies has drastically increased the usage of Web applications. Users share their credentials like userid and password or use their smart cards to get authenticated by the application servers. Smart cards are handy to use, but they are susceptible to stolen smart card attacks and few other notable security attacks. Users prefer to use Web applications that guarantee for security against several security attacks, especially insider attacks, which is crucial. Cryptanalysis of several existing schemes prove the security pitfalls of the protocols from preventing security attacks, specifically insider attacks. This paper introduces LAPUP: a novel lightweight authentication protocol using physically unclonable function (PUF) to prevent security attacks, principally insider attacks. The PUFs are used to generate the security keys, challenge-response pair (CRP) and hardware signature for designing the LAPUP. The transmitted messages are shared as hash values and encrypted by the keys generated by PUF. These messages are devoid of all possible attacks executed by any attacker, including insider attacks. LAPUP is also free from stolen verifier attacks, as the databases are secured by using the hardware signature generated by PUFs. Security analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security attacks. The evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols, despite providing enhanced security.\",\"PeriodicalId\":100766,\"journal\":{\"name\":\"Journal of Communications and Information Networks\",\"volume\":\"9 2\",\"pages\":\"192-206\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10582825\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications and Information Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10582825/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications and Information Networks","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10582825/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

令人难以置信的技术进步大大提高了网络应用程序的使用率。用户共享用户名和密码等凭证,或使用智能卡通过应用程序服务器进行身份验证。智能卡使用方便,但容易受到智能卡被盗攻击和其他一些显著的安全攻击。用户更愿意使用能保证免受多种安全攻击(尤其是内部攻击)的网络应用程序,这一点至关重要。对几种现有方案的密码分析表明,这些协议在防止安全攻击(尤其是内部攻击)方面存在安全隐患。本文介绍了 LAPUP:一种使用物理不可克隆函数(PUF)来防止安全攻击(主要是内部攻击)的新型轻量级身份验证协议。PUF 用于生成安全密钥、挑战-响应对(CRP)和硬件签名,以设计 LAPUP。传输的信息以哈希值的形式共享,并由 PUF 生成的密钥加密。这些信息不会受到任何攻击者的攻击,包括内部攻击。由于使用 PUF 生成的硬件签名确保了数据库的安全,因此 LAPUP 也不会受到验证器被盗的攻击。对协议的安全性分析表明了 LAPUP 在防止内部攻击方面的优势,以及对其他几种安全攻击的抵御能力。对 LAPUP 的通信和计算成本的评估结果清楚地表明,尽管它提供了更高的安全性,但其性能却优于现有协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Insider Attack Prevention: LAPUP—Lightweight Authentication Protocol Using PUF
The incredible progress in technologies has drastically increased the usage of Web applications. Users share their credentials like userid and password or use their smart cards to get authenticated by the application servers. Smart cards are handy to use, but they are susceptible to stolen smart card attacks and few other notable security attacks. Users prefer to use Web applications that guarantee for security against several security attacks, especially insider attacks, which is crucial. Cryptanalysis of several existing schemes prove the security pitfalls of the protocols from preventing security attacks, specifically insider attacks. This paper introduces LAPUP: a novel lightweight authentication protocol using physically unclonable function (PUF) to prevent security attacks, principally insider attacks. The PUFs are used to generate the security keys, challenge-response pair (CRP) and hardware signature for designing the LAPUP. The transmitted messages are shared as hash values and encrypted by the keys generated by PUF. These messages are devoid of all possible attacks executed by any attacker, including insider attacks. LAPUP is also free from stolen verifier attacks, as the databases are secured by using the hardware signature generated by PUFs. Security analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security attacks. The evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols, despite providing enhanced security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信