An Iot Mutual Authentication Scheme Based on PUF and Blockchain
Total Page:16
File Type:pdf, Size:1020Kb
2020 International Conference on Computational Science and Computational Intelligence (CSCI) An IoT mutual authentication scheme based on PUF and blockchain Ore Ndiaye Diedhiou, Cherif Diallo Laboratoire d’Alg`ebre, de Cryptographie, Codes et Applications (LACCA) Dept Informatique, UFR Sciences Appliqu´eeset Technologie (UFR SAT) Universit´eGaston Berger (UGB), BP 234, Saint-Louis, S´en´egal E-mail: [email protected], [email protected] Abstract—Security is one of the major challenges of the Internet of Things (IoT). In an IoT network, data are processed and exchanged without human intervention. Because of this autonomy, objects must authenticate each other as well as to ensure the integrity of the exchanged data. An efficient authentication scheme allows to protect the net- work against several attacks. Several IoT authen- tication schemes have already been proposed but they are mostly ineffective and sometimes have lim- itations. This work proposes a new mutual authen- tication scheme for IoT based on digital signatures, the Physical Unclonable Functions (PUF) and the blockchain technology. The Global Assessment and analyses show that our new protocol gives more resistance to different types of attacks, and that it also provides a better performance in terms of computing load although it requires fewer storage Fig. 1: An illustration of IoT network architecture resources. Index Terms—IoT, Mutual Authentication, PUF, Currently, with the development of the Internet of Blockchain, Things, the number of connected devices is increasing exponentially. Ease deployment of ”connected objects” is an asset that makes them easy to integrate in a lot of market such as: smart waste management, environmental monitoring, smart transportation systems, smart parking, traffic management, smart I. Introduction navigation system for users of public urban transport, the smart grid. In addition, IoT has made possible the evolution of many other areas like: from manufacturing plants to what is actually called Industry 4.0, from The IoT was born out of the aggregation of several agriculture to smart agriculture, from health to smart technologies such as RFID, NFC, wireless sensors and health. actuators, M2M, 3/4G, IPv6, 6lowPAN, RPL, etc. Conceptually, the Internet of Things characterizes For its various applications, the data exchanged physical objects connected and communicating with (which can be critical) must meet many security stan- each other.This network creates a bridge between the dards in order to ensure security services such as physical world and the virtual world. From a technical authentication, confidentiality, availability and data standpoint, the IoT consists of a standardized integrity. Only authorized data exchanges should pro- numerical identification (IP address, smtp, protocols, ceed without any alteration or interruption. Many http, etc.) of a physical object thanks to an wireless IoT security solutions have been proposed. These communication system (Fig.1) that can be used to solutions can be applied at one or more levels of communicate a RFID chip, Bluetooth, Wi-Fi, etc. the Internet of Things ecosystem. However, the first level of security to ensure is authentication. Most of the proposed authentication schemes are based on several mechanisms such as cryptographic algorithms, hash functions, digital signatures, digital certificates, This work is supported by CEA-MITIC (Centre object characteristics, etc. Other recently borrowed d’Excellence en Mathematiques, Informatique et TIC, http : //www.ceamitic.sn/). techniques such as blockchain, are adapted to the IoT 978-1-7281-7624-6/20/$31.00 ©2020 IEEE 1034 DOI 10.1109/CSCI51800.2020.00193 and used in authentication. Our work focuses primarily on authentication, which In this paper, we first present a small review of au- consists of allowing a legitimate user to access re- thentication schemes recently proposed in the Internet sources, as well as denying access to a malicious or of Things. Next, we will present a new solution that attacking person [11]. Many solutions are known for combines the Physical Unclonable Function (PUF) [2] authentication, they are based on all or part of the 3 and the blockchain technology [3] [4] in order to gain commonly accepted authentication factors : in efficiency and to have more resistance of attacks. • ”What we know”, which refers to knowledge that To carry out our work, this document is organized as only the user is supposed to have, for example a follows: section II provides a brief description of IoT secret code. security with an emphasis on authentication; in the • ”‘What we are”, which refers to the nature of the next two sections (III and IV), some recently proposed person, in what is most distinctive about him or authentication schemes and preliminary background her. This point is generally solved by biometrics. are reviewed, before being presented in section V, our Biometrics is based on the recognition of physical proposal, a new mutual authentication system based or behavioural features. on PUF and blockchain. Finally, we give our conclusion • ”What we have”, which is based on a possession in section VI. that only the user is supposed to have, for example II. IoT Security a personal smart card. Internet of Things authentication schemes must have The Internet is the medium of the IoT. Therefore certain characteristics: almost all security threats inherent to the Internet are • It must be lightweight because many IoT objects propagated to the IoT as well [5] [6] [7]. Based on [8] have low computing power, low power consump- [9] [10] [11] we’ve categorized the attacks according to tion and limited memory. the different layers of the Internet architecture of the • It must be efficient in order to find a compromise objects (Fig. 2). Some of these attacks are described between the level of security required and the total in [5] [6]. cost of resource consumption. • It must be robust so that the loss of nodes does not affect the security of communications throughout the network. III. Related works Several authentication schemes in IoT systems have been proposed in the literature [13]. In [1] the proposed scheme uses the TLS secure channel, digital signatures and a functional operation performed on the nuncio. the scheme is efficient and lightweight. The use of timestamping allows resistance Fig. 2: IoT Attacks against replay attack. Cryptographic keys are stored locally, making the scheme vulnerable to attacks re- Unlike traditional nodes, the nodes of the IoT are sulting from physical capture of the object. constrained by their low capacity and limited re- The scheme proposed in [2] is based on the use of sources. The wider adoption of the Internet of Things PUF (Physical Unclonable Function) and hash func- lies in the ability to meet many security requirements tions. The PUF is a function that associates a set in order to avoid catastrophic consequences on hu- of challenges to a set of responses. The use of the man life [12]. In order to ensure effective security PUF in the proposed authentication protocol protects of Internet of Things data, different mechanisms are against cloning attacks. The proposed scheme has the used to ensure authentication, access control and flow advantage of using very few factors, it does not require management (Fig. 3). a secret key stored in the object; the node stores only its identifier. On the other hand, this scheme requires a lot of sent messages and verifications, which can quickly flood all the communication medium in case of high activity. The paper [3] proposes an authentication scheme based on the blockchain. In this scheme, nodes are divided into virtual zones called Bubbles-of-Trust in which nodes could authenticate and trust each other. The use of the blockchain ensures the scalability of Fig. 3: The different levels of security the network. The scheme is resistant to sybil, re- play and malicious node intrusion attacks. However 1035 in this scheme, communications are considered as tion is effective only once. transactions and must be validated by the blockchain It is also resistant to the middle man attack because (implemented with the Ethereum blockchain). The the AN account being confidential, even if the attacker blockchain includes financial costs, in the Ethereum succeeds in intercepting the random factor RT ,he blockchain, the consensus protocol takes 14 seconds will not be able to calculate the hash SHA1 function to validate a transaction, which is considered long for (RT AN). On the other hand, the schema requires some critical applications. many factors and other information that are stored In [4], the authors propose an authentication scheme at the IoT object level, which makes it vulnerable to based on asymmetric cryptography and blockchain. attacks resulting from a physical capture of the object. Each node is a node in the blockchain network. Two During the design of our solution, we have focused types of nodes are thus defined: consensus nodes and on works [2] [3] [4] in order to improve efficiency and non-consensus nodes. The consensus nodes participate performance. Authors of [2] used the PUF technique in the consensus process, generate and distribute the whereas [3] and [4] are based on blockchain techniques. blocks to non-consensus nodes which only transfer These solutions provide more security at the IoT node, data. The authentication scheme includes the three but they have the disadvantage of causing memory steps: enrollment of devices, identity authentication problems. The PUF principle which is an authenti- and integrity verification. cation factor referring to ”What we are”, and what This authentication method [4] is simple and makes it attractive for security is that because of its lightweight. The blockchain technology used has made physical basis, it is immensely difficult if not impossible it possible not only to do without the traditional IoT to produce a physical clone of a PUF [2]. However, the authentication scheme requiring a central authority solution proposed by [2] is neither enough scalable nor (such as a server) but also to create an environment providing all security services.