Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices

Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local...

Full description

Bibliographic Details
Main Authors: Da-Zhi Sun, Yangguang Tian
Format: Article
Language:English
Published: MDPI AG 2022-11-01
Series:Mathematics
Subjects:
Online Access:https://www.mdpi.com/2227-7390/10/22/4310
_version_ 1797464618381082624
author Da-Zhi Sun
Yangguang Tian
author_facet Da-Zhi Sun
Yangguang Tian
author_sort Da-Zhi Sun
collection DOAJ
description Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the session key. Our findings are in the following. First, Zerrouki et al.’s PUF protocol fails to provide known-key security. That is, the adversary can impersonate not only the server to cheat the IoT device but also the IoT device to cheat the server when the adversary corrupts a session key between the server and the IoT device. Second, Zerrouki et al.’s PUF protocol suffers from the key-compromise impersonation attack. It means that the adversary can impersonate the IoT device to cheat the server if the adversary discloses the server’s secret key. Third, Zerrouki et al.’s PUF protocol does not support backward secrecy for the session key. That is, the adversary is always able to derive the session key from the previous session key. We also suggest the root cause of these security flaws in Zerrouki et al.’s PUF protocol. As a case study, our cryptanalysis results would promote a security model for more robust and efficient PUF authentication and session key establishment protocol. Moreover, our idea of the key compromise can be used to evaluate other novel PUF protocol designs.
first_indexed 2024-03-09T18:10:46Z
format Article
id doaj.art-4e00f38b46bd490ea3ae10abbb2448d4
institution Directory Open Access Journal
issn 2227-7390
language English
last_indexed 2024-03-09T18:10:46Z
publishDate 2022-11-01
publisher MDPI AG
record_format Article
series Mathematics
spelling doaj.art-4e00f38b46bd490ea3ae10abbb2448d42023-11-24T09:09:29ZengMDPI AGMathematics2227-73902022-11-011022431010.3390/math10224310Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT DevicesDa-Zhi Sun0Yangguang Tian1Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin 300350, ChinaDepartment of Computer Science, University of Surrey, Surrey GU2 7XH, UKRecently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the session key. Our findings are in the following. First, Zerrouki et al.’s PUF protocol fails to provide known-key security. That is, the adversary can impersonate not only the server to cheat the IoT device but also the IoT device to cheat the server when the adversary corrupts a session key between the server and the IoT device. Second, Zerrouki et al.’s PUF protocol suffers from the key-compromise impersonation attack. It means that the adversary can impersonate the IoT device to cheat the server if the adversary discloses the server’s secret key. Third, Zerrouki et al.’s PUF protocol does not support backward secrecy for the session key. That is, the adversary is always able to derive the session key from the previous session key. We also suggest the root cause of these security flaws in Zerrouki et al.’s PUF protocol. As a case study, our cryptanalysis results would promote a security model for more robust and efficient PUF authentication and session key establishment protocol. Moreover, our idea of the key compromise can be used to evaluate other novel PUF protocol designs.https://www.mdpi.com/2227-7390/10/22/4310physically unclonable functionauthentication protocolknown-key attackkey-compromise impersonationbackward secrecy
spellingShingle Da-Zhi Sun
Yangguang Tian
Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
Mathematics
physically unclonable function
authentication protocol
known-key attack
key-compromise impersonation
backward secrecy
title Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
title_full Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
title_fullStr Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
title_full_unstemmed Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
title_short Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices
title_sort security of a puf mutual authentication and session key establishment protocol for iot devices
topic physically unclonable function
authentication protocol
known-key attack
key-compromise impersonation
backward secrecy
url https://www.mdpi.com/2227-7390/10/22/4310
work_keys_str_mv AT dazhisun securityofapufmutualauthenticationandsessionkeyestablishmentprotocolforiotdevices
AT yangguangtian securityofapufmutualauthenticationandsessionkeyestablishmentprotocolforiotdevices