2022
DOI: 10.3390/electronics11233920
|View full text |Cite
|
Sign up to set email alerts
|

PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT

Abstract: Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and servers. In order to solve the security and availability problems regarding communication between edge devices with constrained resources and servers in M2M communication, in this study we proposed an authentication and session establishment protocol based on physical unclonable functions (PUFs). The scheme does not require clock synchroniz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…In reference 22, Roy et al ensures mutual authentication and offers security against server impersonation, replay, MITM, malicious PUF and machine Learning‐based modeling attacks, simulation is done by using Scyther, and implementation is done by using RPi node. In reference 25, Gong et al ensures mutual authentication, backward and forward secrecy and protects security against device/node impersonation, server impersonation, replay, DoS, and MITM attacks and the proposed mechanism simulates using Colored Petri Net (CPN) tool. This section makes it very clear that the security provided by our proposed mechanism offers safety against different identified attacks.…”
Section: Comparative Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In reference 22, Roy et al ensures mutual authentication and offers security against server impersonation, replay, MITM, malicious PUF and machine Learning‐based modeling attacks, simulation is done by using Scyther, and implementation is done by using RPi node. In reference 25, Gong et al ensures mutual authentication, backward and forward secrecy and protects security against device/node impersonation, server impersonation, replay, DoS, and MITM attacks and the proposed mechanism simulates using Colored Petri Net (CPN) tool. This section makes it very clear that the security provided by our proposed mechanism offers safety against different identified attacks.…”
Section: Comparative Analysismentioning
confidence: 99%
“…In 2021, Barbareschi et al designed an PUF‐based authentication protocol where a weak PUF is combined with an encryption method 24 . In 2022, Gong et al proposed an authentication and key establishment protocol for IIoT 25 . This protocol uses hash, XOR and PUF with fuzzy extractor for lightweight protocol and this protocol is formally verified using CPN tool.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4], a generic IoT trust architecture is proposed that integrates trust into all these layers as an integral component to manage security. IoT faces several security challenges [16], e.g., authentication [17,18], access control [19], trust management in cross-domain along with smart edge nodes [20], security management in IoT equipped with VANET nodes, policy enforcement, secure middleware, and confidentiality. Due to the heterogeneous environment of IoT, it is inevitable to implement robust approaches that maintain a secure environment by eliminating malicious nodes and are also robust enough to keep resilience towards several potential attacks [21][22][23].…”
Section: Introductionmentioning
confidence: 99%