You are looking at a specific version 20170522:212306 of this paper. See the latest version.

Paper 2017/422

PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs

Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh Prabhu

Abstract

Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs). In traditional authentication protocols a user presents a set of credentials with an accompanying proof such as password or digital certificate. However, IoTs need more evolved methods as these classical techniques suffer from the pressing problems of password dependency and inability to bind access requests to the “things” from which they originate. Additionally, the protocols need to be lightweight and heterogeneous. Although PUFs seem promising to develop such mechanism, its unclonability property puts forward an open problem of how to develop such mechanism without needing to store the challenge-response pair (CRP) explicitly at the verifier end. In this paper, we develop an authentication and key exchange protocol called PUF+IBE by combining the ideas of Identity based Encryption (IBE) using Cryptographic Pairing with PUFs. We show that this combination can help to do away with the requirement of explicitly storing the secret CRPs. The proposed protocol is based on two security assumptions: (a) physical and mathematical unclonability of the constituent PUFs, and, (b) computational intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). The security of the protocol is proved in a formal way under the Session Key Security and the Universal Composability Framework. A prototype of the protocol has been implemented to realize a secured video surveillance camera using a combination of an Intel Edison board, with a Digilent Nexys-4 FPGA board comprising of an Artix-7 FPGA, together serving as the IoT node. We show, though the stand-alone video camera can be subjected to man-in-the-middle attack via IP-spoofing using standard network penetration tools, the camera augmented with the proposed protocol resists such attacks and it suits aptly in an IoT infrastructure making the protocol deployable for the industry.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Physically Unclonable FunctionsIdentity based EncryptionInternet of ThingsDevice AuthenticationKey Management
Contact author(s)
urbi chatterjee @ cse iitkgp ernet in
History
2019-03-26: last of 4 revisions
2017-05-22: received
See all versions
Short URL
https://ia.cr/2017/422
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.