Online citations, reference lists, and bibliographies.

Two-Factor Authentication For IoT With Location Information

M. N. Aman, M. Basheer, B. Sikdar
Published 2019 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
The number of Internet of Things (IoT) devices is expected to grow exponentially in the near future and produce large amounts of potentially sensitive data. The simple and low cost nature of IoT devices makes them an attractive target for spoofing or impersonation attacks. To solve this issue, this paper proposes a two-factor authentication protocol using physically unclonable functions and the characteristics of the wireless signal from an IoT device. The security analysis and results on MICAz motes shows that the proposed protocol can be used as an effective tool to secure IoT systems from spoofing as well as various other attacks. A performance analysis of the proposed protocol shows that it has a significantly lower computational overhead and energy consumption compared to existing techniques.
This paper references
10.1109/SECCOM.2007.4550352
Implications of radio fingerprinting on the security of sensor networks
Kasper Bonne Rasmussen (2007)
10.1109/ICCW.2015.7247280
Web-based platform for evaluation of RF-based indoor localization algorithms
Filip Lemic (2015)
ProVerif Simulation Scripts for Proposed Protocols [Software
M. N. Aman (2018)
10.1109/GLOCOM.2012.6503949
Collision detection in IEEE 802.11 networks by error vector magnitude analysis
Muhammad Naveed Aman (2012)
Radio Propagation for Modern Wireless Systems
H. Bertoni (1999)
10.1007/978-1-4614-5040-5
Physical Unclonable Functions in Theory and Practice
C. Bhm (2012)
10.1109/NSITNSW.2015.7176384
One time password authentication scheme based on elliptic curves for Internet of Things (IoT)
V. L. Shivraj (2015)
10.1109/TII.2017.2773666
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
X. Li (2018)
10.1109/VLSIC.2004.1346548
A technique to build a secret key in integrated circuits for identification and authentication applications
J. Lee (2004)
10.1145/100216.100246
The computational complexity of universal hashing
Y. Mansour (1990)
10.1007/978-3-642-41395-7_2
Physically Unclonable Functions: Concept and Constructions
R. Maes (2013)
10.1109/ICCAD.2014.7001362
Hardware obfuscation using PUF-based logic
James Bradley Wendt (2014)
Location monitoring system for maritime security using RSSI technology
R. Vignesh (2018)
10.1109/TDSC.2018.2832201
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Urbi Chatterjee (2019)
10.1007/978-3-319-00119-7_5
The Complexity of Computations
Pavel Pudlák (2013)
10.1155/2017/5989151
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments
R. Amin (2017)
10.1145/800127.804083
Complexity Of Computations
S. Winograd (1978)
10.1145/2517300.2517303
Securing data provenance in body area networks using lightweight wireless link fingerprints
S. T. Ali (2013)
ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
B. Blanchet (2011)
Properties of universal hashing
Martin Babka (2013)
Says 6.4 Billion Connected ‘Things’ Will Be in Use in 2016
Gartner. Gartner (2018)
10.1109/CSFW.1993.246631
Towards formal analysis of security protocols
W. Mao (1993)
10.1109/JIOT.2018.2846299
Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices
Prosanta Gope (2019)
10.1109/tifs.2017.2659640
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Q. Xie (2017)
10.1109/JIOT.2017.2703088
Mutual Authentication in IoT Systems Using Physical Unclonable Functions
M. N. Aman (2017)
10.1155/2010/205407
Impact of LQI-Based Routing Metrics on the Performance of a One-to-One Routing Protocol for IEEE 802.15.4 Multihop Networks
C. Gomez (2010)
10.1109/TIFS.2018.2866304
Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model"
Xiaowei Li (2019)
Physical Unclonable Functions for IoT Security
M. N. Aman (2016)
10.1145/3055245.3055255
Secure Data Provenance for the Internet of Things
M. N. Aman (2017)
10.1109/ICC.2018.8422832
A Deep Learning Approach to IoT Authentication
Rajshekhar Das (2018)
10.1007/978-3-319-94370-1_11
Using Blockchain for IOT Access Control and Authentication Management
Abdallah Zoubir Ourad (2018)
10.1007/s11227-017-2048-0
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
S. Kumari (2018)
10.1109/TII.2018.2806974
Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps
Dariush Abbasinezhad-Mood (2018)
System on chip and method for cryptography using a physically unclonable function
M. Kirkpatrick (2012)
10.2307/2530893
Applied Linear Regression Models.
F. Marriott (1985)
10.17487/RFC4418
UMAC: Message Authentication Code using Universal Hashing
Ted Krovetz (2006)
10.1007/978-81-322-3592-7_25
Distance, Energy and Link Quality Based Routing Protocol for Internet of Things
Kirshna Kumar (2017)
10.1145/1278480.1278484
Physical Unclonable Functions for Device Authentication and Secret Key Generation
G. Suh (2007)
10.1109/DCIS.2017.8311637
Merging smart wearable devices and wireless mesh networks for collaborative sensing
Jaime Zornoza (2017)
Smart Devices Every Minute in 2025: IDC Outlines the Future of Smart Things
Forbes (2018)
10.1007/11605805_8
RFID-Tags for Anti-counterfeiting
P. Tuyls (2006)
Fuzzy extractors : How to generate strong keys from biometrics and other noisy data
Suela Kodra (2015)
10.1007/BF03180031
SoCs security: a war against side-channels
S. Guilley (2004)
10.1109/MSP.2005.1458287
Locating the nodes: cooperative localization in wireless sensor networks
N. Patwari (2005)
10.1016/j.jnca.2017.07.001
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X. Li (2018)
Link Quality in Wireless Sensor Networks
Ana Bildea (2013)
10.1109/ACSSC.2006.355078
Error Vector Magnitude Analysis for OFDM Systems
Chunming Zhao (2006)
10.1145/3005715
A PUF-Based Secure Communication Protocol for IoT
Urbi Chatterjee (2016)
10.1145/586110.586132
Silicon physical random functions
B. Gassend (2002)
10.1109/ICON.2011.6168517
RSSI based location estimation in wireless sensors networks
Raida Al Alawi (2011)
10.1007/978-3-642-04474-8_22
Robust Authentication Using Physically Unclonable Functions
Keith B. Frikken (2009)



This paper is referenced by
10.1109/jiot.2020.3002711
A Scalable Protocol for Driving Trust Management in Internet of Vehicles with Blockchain
U. Javaid (2020)
10.1109/ICCES48766.2020.9138078
Secret Key based Sensor Node Security in the Internet of Things (IoT)
Timothy Malche (2020)
10.1109/ACCESS.2019.2924045
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija (2019)
IoT meets COVID-19: Status, Challenges, and Opportunities
Mohsin Kamal (2020)
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Survey
M. Abuhamad (2020)
10.1109/ACCESS.2020.2996093
Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure
Shehzad Ashraf Chaudhry (2020)
10.1002/dac.4332
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme
Mahdi Nikooghadam (2020)
10.1016/j.future.2019.10.042
Achieving M2M-device authentication through heterogeneous information bound with USIM card
Ta-Wei Yang (2020)
10.1109/JIOT.2019.2942271
Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0
Sahil Garg (2020)
10.1109/jiot.2020.3020076
Sensor-based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey.
M. Abuhamad (2020)
10.3390/s19173663
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
A. Ahmed (2019)
Physical Layer Security: Authentication, Integrity and Confidentiality
Mahdi Shakiba-Herfeh (2020)
10.1186/s13638-020-01742-0
Authenticated secret key generation in delay-constrained wireless systems
M. Mitev (2020)
Semantic Scholar Logo Some data provided by SemanticScholar