Lightweight security authentication method and device based on device fingerprint and PUF

A device fingerprint and security authentication technology, applied in the field of security authentication and the Internet of Things, can solve the problems of vulnerability to physical attacks and cloning attacks, spoofing RSSI values, secret leakage, etc., achieve low energy and silicon area, realize privacy protection, realize Effects of Restoration

Pending Publication Date: 2021-10-19
INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this technique has high communication and computational overhead due to the length of wireless fingerprints and optimization
Another scheme using multi-hop source protocols uses RSSI values ​​but has no authentication mechanism, so attackers can easily spoof RSSI values ​​to hide their location
[0005] In fact, we found that the existing device authentication technologies in the Internet of Things have one or more of the following problems: (1) rely on security hardware that is too expensive for IoT devices; (2) all devices must have the same architecture system; (3) Computationally too complex for IoT devices; (4) Vulnerable to physical attacks and cloning attacks, without privacy protection; (5) Ephemeral Secret Leakage (ESL) attacks can be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight security authentication method and device based on device fingerprint and PUF
  • Lightweight security authentication method and device based on device fingerprint and PUF
  • Lightweight security authentication method and device based on device fingerprint and PUF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Device Registration: Store initial CRP for each edge IoT device (C i , R i ) and false identification (SID i ), C i Denotes the query of the i-th iteration, R i Indicates that the current C i The response of the PUF, SID i Indicates the anonymous ID of the IoT device of the i-th iteration. For each edge IoT device, the server also stores an emergency CRP list (C em ) and an emergency identification list EID to mitigate DoS attacks. The initial parameters are obtained by the server using a time-based one-time password algorithm (TOTP) and by the operator using a password. Each edge IoT device stores C i 、SID i 、C em and EID. Also we assume that device management and connection management have a pre-shared secret symmetric key k GS .

[0065] An embodiment of the present invention provides a lightweight security authentication method based on device fingerprints and PUF, such as figure 2 shown, including the following steps:

[0066] Edge IoT devices gener...

Embodiment 2

[0115] An embodiment of the present invention provides a lightweight security authentication device based on device fingerprints and PUF, such as figure 1 As shown, including: sequentially connected edge IoT devices, connection management and device management;

[0116] Edge IoT devices generate random noise N 1 , and combined with its PUF to generate the secret response R i generate message in, Indicates a false identity; the secret response R i The specific generation process is: edge IoT device ID A Query C using stored i-th iteration i and its PUF to generate the secret response R i ;

[0117] Edge IoT devices based on the message Generating Authentication Parameters I 0 =H(M 0 ||R i ), H is the hash function, and the message and authentication parameters I 0 =H(M 0 ||R i ) is sent to the device management;

[0118] Device management based on received messages Calculate the hash value I 0 ', if I 0 'with I 0 are equal, generate a random noise N 2 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight security authentication method and device based on a device fingerprint and a PUF. The method comprises the steps that edge Internet of Things equipment generates a message M<0> and an authentication parameter I<0> and sends the message M<0> and the authentication parameter I<0> to a device manager; the device manager calculates a Hash value I<0>' based on the received message M<0>, and if I<0>' is equal to I<0>, M<1> is generated, and an authentication parameter I<1> is further generated; the device manager sends the message M<1> and the authentication parameter I<1> to the edge Internet of Things equipment through a connection manager; the edge Internet of Things equipment calculates a Hash value I<1>' based on the received message M<1>, if I<1>' is equal to I<1>, a session key ki is generated, a false identity label of the session key k is updated, and then I<2> is sent to the device manager; and the device manager generates a new false identity label and verifies I<2>, if I<2> passes the verification, the device manager stores the new false identity label for future identity verification requests. According to the invention, anonymity and security of the Internet of Things equipment can be realized.

Description

technical field [0001] The invention belongs to the fields of security authentication and the Internet of Things, and in particular relates to a lightweight security authentication method and device based on device fingerprints and PUF. Background technique [0002] With the continuous growth of Internet of Things (IoT) devices, especially in the scenario where a large number of terminals are connected to the Internet of Things, the large amount of data generated by these devices may cause many security and privacy issues. In IoT, the most important security requirements include device authentication and privacy security. But existing research on IoT device authentication is not exhaustive, and most schemes are vulnerable to impersonation, cloning, denial of service (DoS), and physical attacks. [0003] Existing IoT device authentication research can be divided into three categories, namely security primitive-based, hardware-based, and wireless channel feature-based device ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06H04L29/08G16Y30/10
CPCH04L63/0876H04L63/0435H04W12/06H04L67/12G16Y30/10Y02D30/70
Inventor 缪巍巍曾锃王传君李世豪张震张瑞张明轩滕昌志胡游君周忠冉张文鹏刘赛蔡世龙
Owner INFORMATION & COMM BRANCH OF STATE GRID JIANGSU ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products