MAC HASH XOR PUF-CRP RNG LFSR
0
2
4
6
8
10
12
Total number of executions
Aman et al., 2016
Mahalat et al., 2018
Muhal et al., 2018
Alladi et al., 2020
Proposed
MAC HASH XOR PUF-CRP RNG LFSR
0
2
4
6
8
10
12
Total number of executions
Aman et al., 2016
Mahalat et al., 2018
Muhal et al., 2018
Alladi et al., 2020
Proposed
Figure 3: (a) Performance comparison of IoT device. (b) Performance comparison of Server.
passed mahalat et. al., the balanced use of single
PUF CRP and LFSR in this protocol reduces down
the number of XOR count at a certain optimal com-
pared with by them. Similarly, in server-side com-
putation, fast computing LFSR balances the perfor-
mance of hash and XOR together. Here we have
also eliminated the cryptographic MAC for faster and
lightweight performance. Thus, the claimed authenti-
cation and lightweight key exchange in this proposed
protocol is successfully established.
7 CONCLUSION
A single PUF CRP-based two-pass mutual authen-
tication and key exchange protocol are presented in
this paper. Comparison analysis makes the proto-
col lightweight in nature, and ease of implementation
make the protocol suitable for heterogeneous WSN
and the internet of connected things. Less computa-
tional functionality with adequate security raises the
proposed protocol’s acceptability while maintaining
power consumption at its optimal level. The PUF
based challenge-response mechanism helps in unique
device identification and authentication resists any
physical attack while maintaining communication se-
curity as the utmost priority.
ACKNOWLEDGMENT
This work is supported by DST-SERB under core re-
search scheme (Formerly EMR) through grant No.
EMR/2017/003206 and Young Faculty Research Fel-
low of Visvesvaraya PhD scheme through the grant
No. MLA/MUM/GA/10(37)B.
REFERENCES
Alladi, T., Naren, N., Bansal, G., Chamola, V., and Guizani,
M. (2020). Secauthuav: A novel authentication
scheme for uav-base station scenario. IEEE Trans-
actions on Vehicular Technology.
Aman, M. N., Basheer, M. H., and Sikdar, B. (2020). A
lightweight protocol for secure data provenance in the
internet of things using wireless fingerprints. IEEE
Systems Journal.
Aman, M. N., Chua, K., and Sikdar, B. (2016). Position
paper: Physical unclonable functions for iot security.
In 2nd ACM international workshop on IoT privacy,
trust, and security, pages 10–13. ACM.
Blanchet, B. (2013). Automatic verification of security pro-
tocols in the symbolic model: The verifier proverif. In
Foundations of security analysis and design VII, pages
54–87. Springer.
Chatterjee, U., Govindan, V., Sadhukhan, R., Mukhopad-
hyay, D., Chakraborty, R. S., Mahata, D., and Prabhu,
M. M. (2018). Building puf based authentication and
key exchange protocol for iot without explicit crps in
verifier database. IEEE transactions on dependable
and secure computing, 16(3):424–437.
Gao, Y., Su, Y., Xu, L., , and Ranasinghe, D. C. (2018).
Lightweight (reverse) fuzzy extractor with multiple
reference puf responses. IEEE Transactions on Infor-
mation Forensics and Security, 14(7):1887–1901.
Mahalat, M. H., Saha, S., Mondal, A., and Sen, B. (2018).
A puf based light weight protocol for secure wifi au-
thentication of iot devices. In 2018 8th International
Symposium on Embedded Computing and System De-
sign (ISED), pages 183–187. IEEE.
Muhal, M. A., Luo, X., Mahmood, Z., and Ullah, A.
(2018). Physical unclonable function based authen-
tication scheme for smart devices in internet of things.
In 2018 IEEE International Conference on Smart In-
ternet of Things (SmartIoT), pages 160–165. IEEE.
Mukhopadhyay, D. (2016). Pufs as promising tools for
security in internet of things. IEEE Design & Test,
33(3):103–115.
Pappu, R., Recht, B., Taylor, J., and Gershenfeld, N.
(2002). Physical one-way functions. Science,
297(5589):2026–2030.
Roy, S. (2021). Github: Proverif scripts for node server
authentication protocol. GitHub repository: https://
github.com/sourav-roy-git/Proverif
scripts.
R
¨
uhrmair, U. and van Dijk, M. (2013). Pufs in security
protocols: Attack models and security evaluations. In
2013 IEEE symposium on security and privacy, pages
286–300. IEEE.
PUF based Lightweight Authentication and Key Exchange Protocol for IoT
703