can be generated only by e sensor using its
PUF and contain new sequence number
generated for new message. Besides, to prevent
replay attacks on the message exchanged
between actors, new nonces are generated to
guarantee the freshness of each session.
Resistance to Impersonation Attack. The
proposed scheme implements ZKP protocol to
authenticate a sensor device which allows the
to verify that the sensor knows the private
key without disclosing it. A sensor can prove
that it knows the correct by re-generating it
involving its implemented PUF. Given that the
PUF is unique for each device, an adversary
cannot re-generate to impersonate the .
Resistance to Man In the Middle Attack. an
attacker cannot perform a MITM attack in the
communication between the and a sensor
because at each time each one checks that the
other knows the and the
used to generate the challenge
saved by the sensor. An attacker is not also able
to decrypt several messages because they are
encrypted by a secret key already calculated by
the . On top of that, our scheme is based on
CPUF which prevents an attacker, even though
he determined the challenge saved by the
sensor, to probe the device and get the response.
6 CONCLUSION
We proposed in this paper a secure authentication
scheme for cloud-based smart city surveillance
system. The proposal solution exploits, firstly, ECC
to enable the sensor device to generate a pair of
asymmetric key and the PUF hardware to secure the
private key from tampering, and then ZKP to prove
the authenticity of the generated public key.
Moreover, the generated asymmetric keys are
leveraged to provide encryption and signature
mechanism to protect exchanged data with sensors
while coping with their resources-limitations. In
addition, our proposed solution enables to
authenticate anonymously a sensor in the cloud
environment. In a future work, we will extend our
proposed scheme to support the authentication of
virtual sensors created starting from a dynamic set of
mobile and heterogeneous sensor devices.
REFERENCES
Aman, M. N., Chua, K. C. & Sikdar, B., 2017. Secure
Data Provenance for the Internet of Things. In
Proceedings of the 3rd ACM International Workshop
on IoT Privacy, Trust, and Security, IoTPTS'17, pp.
11-14, Abu Dhabi, United Arab Emirates.
Dijk, B. G. a. M. V. et al., 2008. Controlled Physical
Random Functions and Applications. ACM
Transactions on Information and System Security
(TISSEC), 10(4), pp. 3:1--3:22.
Dijk, B. G. a. M. V. et al., 2008. Controlled Physical
Random Functions and Applications. ACM
Transactions on Information and System Security
(TISSEC), 10(4).
Hofer, C. B. a. M., 2012. Physical Unclonable Functions
in Theory and Practice. 1 ed. New York, USA:
Springer Publishing Company.
Hu, J.-X., Chen, C.-L., Fan, C.-L. & Wang, K.-h., 2017.
An Intelligent and Secure Health Monitoring Scheme
Using IoT Sensor Based on Cloud Computing.
Sensors, Volume 2017, p. 11.
Kalra, S. & Sood, S. K., 2015. Secure authentication
scheme for IoT and cloud servers. Pervasive and
Mobile Computing, 24(C), pp. 210 - 223.
Lao, Y., Yuan, B., Kim, C. H. & Parhi, K. K., 2017.
Reliable PUF-Based Local Authentication With Self-
Correction. IEEE Transactions on Computer-Aided
Design of Integrated Circuits and Systems, 36(2), pp.
201-213.
Schleicher, M. V. a. J. M., Inzinger, C., Dustdar, S. &
Ranjan, R., 2016. Migrating Smart City Applications
to the Cloud. IEEE Cloud Computing, 3(2), pp. 72-79.
Suárez-Albela, M., Fernández-Caramés, T. M., Fraga-
Lamas, P. & Castedo, L., 2017. A Practical Evaluation
of a High-Security Energy-Efficient Gateway for IoT
Fog Computing Applications. Sensors, 17(9).
Wallrabenstein, J. R., 2015. Implementing Authentication
Systems Based on Physical Unclonable Functions. In
Proceedings of the 14th IEEE International
Conference On Trust, Security And Privacy In
Computing And Communications, TrustCom-15, pp.
790-796, Helsinki, Finland.
Wallrabenstein, J. R., 2016. Practical and Secure IoT
Device Authentication Using Physical Unclonable
Functions. In Proceedings of the IEEE 4th
International Conference on Future Internet of Things
and Cloud (FiCloud 2016), pp. 99-106, Vienna,
Austria.
Yosra, B. D., Yacine, D., Slim, R. & Noureddine, B.,
2018. Cloud-based Global Monitoring System for
Smart Cities. In Proccedings of the 32nd IEEE
International Conference on Advanced Information
Networking and Applications Workshops, WAINA
2018, Cracow, Poland.
Secure Authentication Solution for Cloud-based Smart City Surveillance System
507