Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT
| dc.contributor.author | Manivannan, S. | |
| dc.contributor.author | Chakraborty, R.S. | |
| dc.contributor.author | Chakrabarti, I. | |
| dc.contributor.author | Ramalingam, J. | |
| dc.date.accessioned | 2026-02-04T12:24:48Z | |
| dc.date.issued | 2024 | |
| dc.description.abstract | The immense potential of the Internet of Things (IoT) is challenged by grave security vulnerabilities that are easily exploitable in resource-constrained environments. We propose a lightweight Authentication and Key Agreement (AKA) protocol to derive a shared session key for each communicating node in a mutually communicating cluster of IoT nodes. Each IoT device is embedded with a Physically Unclonable Function (PUF), and a Fuzzy Extractor (FE) is deployed to correct and reproduce the private key and public helper data pair from the possibly erroneous PUF response. This secret raw PUF response is not stored explicitly in the server. A forward-secure authenticated key agreement is achieved by incorporating Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. The security of the proposed scheme has been formally verified while considering both active and passive attackers using the Verifpal tool. A prototype implementation with the arbiter PUF circuit, FE, and associated software has successfully demonstrated the efficacy of our scheme. © 2009-2012 IEEE. | |
| dc.identifier.citation | IEEE Embedded Systems Letters, 2024, 16, 2, pp. 118-121 | |
| dc.identifier.issn | 19430663 | |
| dc.identifier.uri | https://doi.org/10.1109/LES.2023.3299200 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/21120 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.subject | Authentication | |
| dc.subject | Formal verification | |
| dc.subject | Internet of things | |
| dc.subject | Iron | |
| dc.subject | Network security | |
| dc.subject | Authentication and key agreement protocols | |
| dc.subject | Authentication and key agreements | |
| dc.subject | Fuzzy extractor | |
| dc.subject | Fuzzy extractors | |
| dc.subject | Internet of thing | |
| dc.subject | Physically unclonable function | |
| dc.subject | Physically unclonable functions | |
| dc.subject | Prototype | |
| dc.subject | Security vulnerabilities | |
| dc.subject | Session key | |
| dc.subject | Cryptography | |
| dc.title | Practical and Efficient PUF-Based Protocol for Authentication and Key Agreement in IoT |
