Next Article in Journal
An Intelligent Machinery Fault Diagnosis Method Based on GAN and Transfer Learning under Variable Working Conditions
Next Article in Special Issue
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme
Previous Article in Journal
Efficient Approach for Extracting High-Level B-Spline Features from LIDAR Data for Light-Weight Mapping
Previous Article in Special Issue
Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm

1
College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
2
Department of Computer Science, University of California, Davis, CA 001313, USA
3
Department of Mathematics, Chaudhary Charan Singh University, Meerut 250004, India
4
Department of Information Management, Chaoyang University of Technology, Taichung 41349, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9174; https://doi.org/10.3390/s22239174
Submission received: 14 October 2022 / Revised: 17 November 2022 / Accepted: 22 November 2022 / Published: 25 November 2022
(This article belongs to the Special Issue Physical Security for Devices of the Internet of Things)

Abstract

:
The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storage. The application of edge computing in the smart home environment can enable users to enjoy smart home services. However, users and smart devices communicate through public channels, and malicious attackers may intercept information transmitted through public channels, resulting in user privacy disclosure. Therefore, it is a critical issue to protect the secure communication between users and smart devices in the smart home environment. Furthermore, authentication protocols in smart home environments also have some security challenges. In this paper, we propose an anonymous authentication protocol that applies edge computing to the smart home environment to protect communication security between entities. To protect the security of smart devices, we embed physical unclonable functions (PUF) into each smart device. Real-or-random model, informal security analysis, and ProVerif are adopted to verify the security of our protocol. Finally, we compare our protocol with existing protocols regarding security and performance. The comparison results demonstrate that our protocol has higher security and slightly better performance.

1. Introduction

The internet of things (IoT) [1,2,3,4] is a network connected with everything, which can collect various types of information in real time and communicate with other devices. The development of the IoT has brought significant achievements in different fields, such as smart city [5,6,7,8], healthcare [9,10,11], vehicular ad hoc network (VANET) [12,13,14,15,16], smart home [17,18,19], and artificial intelligence [20,21]. The smart home is the embodiment of IoT. It is an environment in which smart devices are deployed in the house, and various devices provide services to users through connecting to the internet. People can access smart home services anytime and anywhere through voice assistants or applications and easily control smart devices. In the smart home environment, people’s live have become more comfortable, their lifestyle has become more intelligent, and people’s quality of life is also constantly improving.
Many smart devices are deployed in the smart home environment, such as smart air conditioners, smart desk lamps, and smart curtains. These smart devices can provide users with various services. The traditional framework of the smart home is shown in Figure 1. The framework consists of four entities: registration authority (RA), users, gateway, and smart devices. The primary responsibilities of RA include the registration of users and smart devices as well as the distribution of system parameters. Gateway is a bridge between smart devices and users. Only smart devices registered in RA can provide services for users. Users use mobile devices (such as smartphones, tablets, and smartwatches) to control smart devices in their homes at any time. For example, users can turn on the air conditioner and close the curtains outdoors; users can master the family situation by viewing the smart camera.
The traditional smart home architecture relies on centralized cloud computing, which is used for data collection and processing. There are some problems in the traditional architecture; for example, in monitoring this application scenario that requires real-time feedback, cloud computing [22,23,24] will process a great deal of data, which may not meet users’ real-time needs [25,26]. Edge computing [27,28,29] is closer to the data source than cloud computing. It can better process data and provide real-time access, solving the above problems. An edge gateway is the node of edge computing, which can give real-time computing and storage in the smart home environment instead of going to the remote cloud center. The edge gateway can locally process the data collected between the user’s mobile device and the smart device. First, the user and the smart device are registered in the registration center, and the registered legal user negotiates the session key with the smart device with the help of the edge gateway. Only legal users can enjoy smart home services. Although smart homes bring convenience to people’s lives, users and smart devices communicate through public channels. Due to the openness of the public channel, the information transmitted in the public channel may be intercepted by malicious attackers, which will lead to user privacy disclosure. Therefore, protecting users and smart devices for secure communication is very important.
The physical unclonable function (PUF) [30,31] is a function that can be embedded in an integrated circuit. The integrated circuit takes a bit string as input (or called challenge) and generates a random response string as the output. For various PUF modules manufactured on the same integrated circuit, no two PUF modules will produce the same response if faced with the same challenges. If a malicious attacker wants to change or destroy the PUF, it will change the corresponding internal circuit and logic gate delay. At this time, even if the same challenge is entered, the malicious attacker cannot obtain the same response. According to the microstructure and response of a given PUF, it is difficult for a malicious attacker to guess or infer the correct challenge. Moreover, the PUF is available on demand and does not require secure storage.
In this paper, a smart home authentication protocol using PUF and edge computing paradigm is proposed. The following are the novelty and contributions of this paper:
(1)
To the best of our knowledge, we are the first to introduce an edge-computing-based smart home architecture and propose an authentication protocol based on this architecture. In our protocol, the user and the smart device realize mutual authentication with the help of the edge gateway and successfully establish a session key for secure communication.
(2)
We apply PUF to smart devices to prevent data-leakage attacks launched by attackers, thus ensuring data security. According to the security properties of PUF, even if an attacker gets the same challenge, they cannot get the same response. Therefore, using PUF in our protocol can resist tampering and biological cloning attacks.
(3)
We verify the security of our protocol by using the real or random (ROR) model, informal security analysis and simulation software (ProVerif). The results are shown that the proposed protocol can resist several well-known attacks.
(4)
Finally, we compare our protocol with existing protocols regarding security and performance. The comparisons demonstrate that our protocol guarantees better security and slightly lower communication cost.
The remainder of this paper is structured as follows. The relevant research on smart homes, edge computing, and PUF is briefly reviewed in Section 2. In Section 3, we describe the system model and detailed protocol. We prove the security of our proposed protocol in Section 4. In Section 5, we compare our protocol with existing protocols in terms of security and performance. In Section 6, we set forth our conclusions.

2. Related Work

Many researchers proposed several authentication and key agreement (AKA) protocols in different environments. In 2008, Jeong et al. [32] proposed a lightweight user authentication protocol in the home network environment. This protocol could not guarantee the anonymity of users, and users were easily tracked. In addition, the protocol could not resist attacks by privileged insiders. Vaidya et al. [33] proposed a strong cryptographic-based AKA protocol in the home network environment. The author showed that this protocol has strong security. However, Kim et al. [34] performed cryptanalysis on the protocol of Vaidya et al. [33] and found that their protocol could not provide forward security and suffered from stolen smart card attacks. Kim et al. [34] indicated the security vulnerabilities of Vaidya et al.’s protocol [33] and proposed an enhanced AKA. Unfortunately, the protocol of Kim et al. [34] could not resist privileged insider attacks and was unable to guarantee users’ anonymity and untraceability. In 2017, Wazid et al. [35] proposed a lightweight AKA for remote users. They proved that their protocol was secure and had good performance. However, Lyu et al. [36] discovered that the protocol of Wazid et al. [35] was unable to withstand stolen verifier attacks and synchronization attacks. Lyu et al. [36] introduced IFTTT as a home gateway and used it as the executor and supervisor of commands. In 2019, Shuai et al. [37] proposed an efficient AKA protocol using elliptic curve cryptography (ECC) and showed that the protocol could resist existing attacks. However, Kaur and Kumar [38] found that Shuai et al.’s protocol [37] was vulnerable to insider attacks, replay attacks, and offline password guessing attacks. Subsequently, Kaur and Kumar [38] proposed a two-factor AKA protocol to enhance security. Unfortunately, Yu et al. [18] found that the protocol of Kaur and Kumar [38] could not resist impersonation attacks and session key disclosure attacks and proposed a secure AKA protocol based on three factors. However, Alzahrani et al. [39] discovered that Yu et al.’s protocol [18] was unable to achieve mutual authentication. Banerjee et al. [40] found that Shuai et al.’s protocol [37] could not resist stolen smart card attacks and user impersonation attacks and then proposed an efficient anonymous authentication protocol. Unfortunately, this protocol cannot guarantee the anonymity and untraceability of users [41]. Oh et al. [42] proposed an efficient authentication protocol using the hush function for IoT-based smart home environments. They proved that the protocol can resist known attacks.
In edge-computing environments, Tsai and Lo [43] proposed an authentication protocol using identity-based encryption technology. This protocol is based on bilinear pairing and the identity-based cryptosystem, which reduced the computation of users and servers. However, Jiang et al. [44] proved that the protocol of Tsai and Lo [43] was vulnerable to server impersonation attacks. Irshad et al. [45] also found that Tsai and Lo’s protocol [43] could not resist the de-synchronization attacks. They designed an improved multi-server authentication protocol and proved that the designed protocol could resist known attacks. However, Xiong et al. [46] pointed out that the protocol of Irshad et al. [45] lacked the registration and revocation of users and designed a new protocol. Later, Jia et al. [47] designed an identity-based authentication protocol. However, Li et al. [26] found that Jia et al.’s protocol [47] could not resist man-in-the-middle (MITM) attacks and then proposed a novel mobile edge computing environment architecture and designed a lightweight AKA protocol on this architecture. Unluckily, Li et al.’s protocol [26] cannot resist replay attacks and denial of service attacks. Kaur et al. [48] proposed a lightweight privacy-preserving AKA protocol, which adopts elliptic curve cryptography to resist various attacks, thus ensuring secure communication between entities.
Numerous PUF-based AKA protocols were recently proposed to address the aforementioned well-known security issues. Aysu et al. [49] proposed a secure and efficient end-to-end AKA protocol based on PUF between servers and resource-limited devices. Chatterjee et al. [50] designed a PUF-based AKA protocol for the IoT to realize authentication and secure information transfer between devices. Braeken [51] analyzed Chatterjee’s protocol [50] and found that it could not resist MITM attacks and replay attacks and proposed an efficient AKA protocol. Gope et al. [52] proposed a lightweight AKA protocol for user privacy protection in industrial wireless sensor networks. In this protocol, user and sensor nodes can authenticate and negotiate the session key with the aid of the gateway. Chen et al. [53] found that PUF-authentication protocols are vulnerable to machine learning attacks. Therefore, they adopted the concept of Shamir’s secret sharing to design an AKA protocol to resist the attacks. Ebrahimabadi et al. [54] designed a novel authentication protocol based on PUF and showed that the protocol has better security and efficiency. In order to ensure that users can obtain secure and timely services in a smart city environment, Yu et al. [55] proposed a lightweight authentication protocol based on PUF in an internet of drones environment. Shao et al. [56] proposed an AKA protocol using PUF in a wireless medical sensor environment with limited resources to ensure data security and patient privacy. Some significant relevant works are listed in Table 1.

3. Proposed Protocol

In this section, an authentication protocol using PUF and the edge-computing paradigm for the smart home environment is proposed. Four entities, trusted third party T T P , edge gateway E G W , user U i , and smart device S D j , are involved in our protocol. The system model is shown in Figure 2. Details on each entity are described below:
(1)
Trusted third party T T P : T T P is a trusted entity, mainly responsible for the registration of home users and smart devices. Additionally, it stores a few users and smart device registration parameters in the edge gateway’s secure database.
(2)
Edge gateway E G W : E G W is a trusted entity and is deployed in the home. E G W can collect data from various smart devices, process the data, and send the processed data to users who need data. It also serves as a bridge between smart devices and users.
(3)
Home user U i : U i refers to the legal users who have successfully registered through T T P . With the help of the E G W , legal home users can enjoy the services provided by smart devices and remotely control them through mobile devices (such as smartphones, tablets, and smartwatches) anytime and anywhere.
(4)
Smart device S D j : S D j deployed in the smart home environment (such as cameras, smart refrigerators, smart desk lamps, and smart locks) must be registered with T T P . Each smart device is embedded with a PUF module. In the smart home, it can execute the instructions transmitted by the user through the edge gateway and collect the data.
Our protocol is divided into the registration, login and authentication phases. Before U i and S D j are deployed in the smart home environment, T T P generates a master key x. Each S D j has a unique identity S M I D j and PUF module. The symbols used in the protocol are shown in Table 2, and the following thoroughly explains each phase.

3.1. Registration Phase

In the smart home environment, U i and S D j must register with T T P via a secure channel. There are two phases of registration: U i registration and S D j registration.
User Registration Phase. If U i wants to enjoy smart home services, he or she must first register as a legal user in T T P . The process of U i registration is shown in Figure 3. The steps of U i registration are described in detail below.
(1)
To begin with, U i uses the mobile device to enter the identity U I D i , password U P W i , and selects a random number a i . Then, the mobile device calculates
P I D i = h ( U I D i a i ) .
Finally, U i passes { P I D i , U P W i , a i } to T T P through the secure channel.
(2)
When T T P receives { P I D i , U P W i , a i } , first retrieves P I D i from the database of T T P . If retrieved in the database, T T P rejects the U i ’s registration. Or else, T T P calculates
X U T = h ( P I D i a i x ) , R 1 = X U T h ( U P W i a i ) .
Thereafter, T T P calculation is completed, stores { P I D i } in its database, and stores { P I D i , X U T } in the secure database of E G W . Finally, T T P sends { R 1 } to U i .
(3)
When U i receives { R 1 } , it calculates
S 1 = a i h ( U I D i U P W i ) , V i = h ( P I D i R P W i a i ) .
Finally, U i stores { S 1 , R 1 , V i } in the mobile device.
Smart Device Registration Phase. S D j must be registered at T T P before it can provide smart home services to U i . The S D j registration process is shown in Figure 4. The following are the specific S D j registration process.
(1)
Initially, S D j selects an identity S M I D j , generates a challenge C j . Then, S D j calculates
R j = P U F ( C j ) , G e n ( R j ) = ( σ j , δ j ) .
Finally, S D j sends { S M I D j , C j , δ j } to T T P .
(2)
After receiving { S M I D j , C j , δ j } , T T P retrieves S M I D j from the database. If not retrieved in the database, T T P calculates
X S T = h ( S M I D j x δ j ) .
Then, T T P stores { S M I D j } in its database and stores { S M I D j , C j , δ j , X S T } in E G W ’s security database. Finally, T T P sends { X S T } to S D j .
(3)
After receiving { X S T } , S D j generates a random number b j , and then calculates
S 2 = X S T h ( S M I D j b j ) , S 3 = δ j h ( S M I D j b j X S T ) .
Finally, S D j stores { S 2 , S 3 , b j } in memory.

3.2. Login and Authentication Phase

In this phase, all entities communicate via a public channel. With the help of the E G W , the legal U i establishes a session key S K with the S D j . The established S K facilitates the U i to safely obtain the service of the S D j and future communication. The detailed login and authentication process is shown in Figure 5. The steps of this process are described in detail below.
(1)
First, U i uses the mobile device to input his own identity U I D i , password U P W i , and then calculates
a i = h ( U I D i U P W i ) S 1 , P I D i = h ( U I D i a i ) , V i * = h ( P I D i R P W i a i ) .
Next, U i check V i * = ? V i . If it holds, U i successfully logs in. Otherwise, U i will be denied login. Then, U i calculates
X U T = R 1 h ( a i U P W i ) , R I D i = h ( P I D i a i X U T ) .
Additionally, U i selects unique identity S M I D j of the S D j , random number r i , and T 1 . Then, U i calculates
W 1 = ( S M I D j r i ) h ( X U T T 1 ) , W 2 = R I D i X U T T 1 , V U E = h ( R I D i X U T r i T 1 ) .
At last, U i sends the message M 1 = { W 1 , W 2 , P I D i , V U E , T 1 } through the public channel to E G W .
(2)
When receiving M 1 sent by U i , E G W first checks | T 1 T s | Δ T . If T 1 is valid, E G W uses P I D i retrieve X U T from the secure database, and calculates
( S M I D j r i ) = W 1 h ( X U T T 1 ) , R I D i = W 2 X U T T 1 , V U E * = h ( R I D i X U T r i T 1 ) .
Next, E G W checks V U E * = ? V U E . If it is correct, E G W authenticates S D j , and uses S M I D j retrieves { C j , δ j , X S T } from the secure database. Then, E G W generates a timestamp T 2 , and calculates
W 3 = ( C j R I D i r i ) S M I D j δ j , V E D = h ( R I D i δ j X S T T 2 ) .
Eventually, E G W sends the message M 2 = { W 3 , V E D , T 2 } to S D j .
(3)
When S D j receives M 2 sent from E G W , first checks | T 2 T s | Δ T . Then, S D j calculates
X S T = S 2 h ( S M I D j b j ) , δ j = S 3 h ( S M I D j b j X S T ) , ( C j R I D i r i ) = W 3 S M I D j δ j , V E D * = h ( R I D i δ j X S T T 2 ) .
Next, S D j checks V E D * = ? V E D . If it is correct, the identity of the E G W is authenticated, then S D j calculates
σ j = R e p ( P U F ( C j ) , δ j ) , P S M I D j = h ( S M I D j σ j X S T ) .
Additionally, S D j generates r j and T 3 , then calculates
S K = h ( ( R I D i r i ) ( P S M I D j r j ) ) , W 4 = ( P S M I D j r j ) X S T δ j , V D E = h ( P S M I D j r j δ j T 3 ) .
Finally, S D j sends the message M 3 = { W 4 , V D E , T 3 } to E G W .
(4)
When E G W receives M 3 sent by S D j , first checks | T 2 T s | Δ T . If T 3 is valid, E G W calculates
( P S M I D j r j ) = W 4 X S T δ j , V D E = h ( P S M I D j r j δ j T 3 ) .
Next, E G W checks V D E * = ? V D E . If it is correct, E G W authenticates the S D j . Next, E G W generates a timestamp T 4 , and calculates
W 5 = ( P S M I D j r j ) R I D i X U T , V E U = h ( P S M I D j r j R I D i T 4 ) .
At last, E G W sends the message M 4 = { W 5 , V E U , T 4 } to U i .
(5)
When receiving M 4 sent by E G W , U i first checks | T 4 T s | Δ T . Then, U i calculates
( P S M I D j r j ) = W 5 R I D i X U T , V E U * = h ( P S M I D j r j R I D i T 4 ) .
Finally, U i checks V E U * = ? V E U . If the verification is successful, U i calculates
S K = h ( ( R I D i r i ) ( P S M I D j r j ) ) .
The S K of the U i and S D j is successfully established, indicating the complete login and authentication process.

4. Security Analysis

4.1. Formal Security Analysis

In this section, we verify the security of the proposed protocol by using the ROR [57,58,59] model. Under the ROR model, different rounds of games are set up to simulate whether an attacker (A) can crack the protocol in polynomial time and calculate the S K so as to verify the security of the proposed protocol.
Adversarial Model. In this paper, we use commonly used Dolev–Yao [60] and Canetti–Krawczyk [61] models. The following describes the capabilities of A in the above model.
(1)
A can eavesdrop, update, delete, intercept and modify information in the public channel.
(2)
A can steal the U i ’s mobile device and then through physical analysis to obtain U i ’s private information stored in the mobile device [62].
(3)
Through a dictionary attack, A can guess the U i ’s identity or password, but A cannot simultaneously speculate U i ’s identity and password.
(4)
A can obtain the temporary value of any entity.
(5)
A cannot access information stored in the E G W security database.
Security Model. The proposed protocol involves U i , E G W , and S D j . We define Π U i x , Π E G W y , and Π S D j z represents the x-th U i instance, the y-th E G W instance, and the z-th S D j instance respectively. Here, assume that the A can implement the following operations under the ROR model.
(1)
E x e c u t e ( E ) : A can eavesdrop on messages transmitted between entities, where E = { Π U i x , Π G W y , Π D j z }.
(2)
S e n d ( E , M i ) : A sends the message M i to E and get E’s response.
(3)
H a s h ( s t r i n g ) : A enters a string and obtain the string’s hash value.
(4)
C o r r u p t ( Π U i x ): A can get U i information stored in the mobile device.
(5)
T e s t ( E ) : A guesses the correct S K by flipping the coin C. If C = 1, A can obtain the correct S K . If C = 0, A can obtain a random string with the same length as the S K .
According to both models, we adopt Theorem 1 to show the security of our proposed protocol.
Theorem 1.
Under the ROR model, the advantages of the A’s ability to break the proposed protocol in polynomial time ξ are: A d v A P ( ξ ) q h 2 | H a s h | + q s 2 | P U F | + 2 C · q s e n d s . Here, q h refers to the number of hash operations performed, | H a s h | refers to the space of the hash function, | P U F | refers to the PUF function, and C and s refer to two constants.
Proof 
We defined five games: G M 0 - G M 4 to simulate the process of A attacking our proposed protocol. In the process of proof, S u c c A G M i ( ξ ) is defined as the probability of A winning in G M i , A d v A P is defined as the advantage of A to crack the protocol. The specific proof steps are as follows:
G M 0 : In G M 0 , A starts the game by tossing a coin C and does not perform any operation in the game. Therefore, we can obtain
A d v A P ( ξ ) = | 2 P r [ S u c c A G M 0 ( ξ ) ] 1 | .
G M 1 : By executing E x e c u t e ( E ) , A can eavesdrop M 1 = { W 1 , W 2 , P I D i , V U E , T 1 } , M 2 = { W 3 , V E D , T 2 } , M 3 = { W 4 , V D E , T 3 } , and M 4 = { W 5 , V E U , T 4 } . When G M 1 at the end of the session, calculate the S K by executing T e s t ( ) query, where S K = h ( ( R I D i r i ) ( P S M I D j r j ) ) . However, A cannot obtain values { R I D i , P S M I D j , r i , r j } , so A cannot calculate S K . Therefore, there is no difference between the probabilities of G M 1 and G M 0 :
P r [ S u c c A G M 1 ( ξ ) ] = P r [ S u c c A G M 0 ( ξ ) ] .
G M 2 : Add S e n d ( ) operation and H a s h ( ) operation in G M 2 . Because the authentication values { V U E , V E D , V D E , V E U } are composed of the private value generated by each entity and is secured by the hash function, so A cannot tamper with the message. In addition, the random number in the authentication value is different in each session, so a hash collision does not occur. Therefore, according to the birthday paradox, we can obtain
| P r [ S u c c A G M 2 ( ξ ) ] P r [ S u c c A G M 1 ( ξ ) ] | q h 2 2 | H a s h | .
G M 3 : In G M 3 , the difference from G M 2 is to delete the H a s h ( ) operation and add P U F query. As described in Section 1, according to the security attributes of the PUF (·), we can obtain the probability of G M 3 as
| P r [ S u c c A G M 3 ( ξ ) ] P r [ S u c c A G M 2 ( ξ ) ] | q s 2 | P U F | .
G M 4 : In G M 4 , A obtains the information { A 1 , R 1 , V i } in the mobile device by executing the C o r r u p t ( ) query, and attempts to exploit the offline password guessing attacks to obtain the user’s correct password U P W i . Since A cannot obtain the U i ’s P I D i and random number a i . The U i ’s password cannot be guessed. Therefore, according to Zipf’s law [63], we can conclude that
| P r [ S u c c A G M 4 ( ξ ) ] P r [ S u c c A G M 3 ( ξ ) ] | C · q s e n d s
Finally, A can only guess bit C to obtain the correct S K so as to win the game. Therefore, we can obtain
A d v A P ( ξ ) 2 = | P r [ S u c c A G M 0 ( ξ ) ] 1 2 = | P r [ S u c c A G M 0 ( ξ ) ] P r [ S u c c A G M 4 ( ξ ) ] | = | P r [ S u c c A G M 1 ( ξ ) ] P r [ S u c c A G M 4 ( ξ ) ] | i = 0 3 | P r [ S u c c A G M i + 1 ( ξ ) ] P r [ S u c c A G M i ( ξ ) ] | = q h 2 2 | H a s h | + q s 2 2 | P U F | + C · q s e n d s
Finally, we can conclude that
A d v A P ( ξ ) q h 2 | H a s h | + q s 2 | P U F | + 2 C · q s e n d s

4.2. Informal Security Analysis

MITM Attacks. It is assumed that A can intercept all information transmitted in the public channel. Let us take message M 2 as an example, message M 2 contains the authentication value V E D = h ( R I D i δ j X S T T 2 ) , A tried to tamper with the value of V E D , but A does not know R I D i , δ j , and X S T , so A cannot tamper with the authentication value V E D . Similarly, A cannot tamper with the message M 1 , M 3 , and M 4 . Therefore, evil intermediaries cannot break our protocol.
Smart Device Stolen Attacks. Suppose A obtains the information { S 2 , S 3 , b j } , which is stored in the memory of S j . Since each S j is embedded with a PUF module, A is unable obtain the value of δ j and A cannot calculate P S M I D j . Similarly, A cannot calculate R I D i and r i , so A is incapable of successfully calculating S K . Thus, our protocol can resist smart device stolen attacks.
Temporary Value Disclosure Attacks. Suppose A can obtain the random number generated in any entity. Let us take A can obtain r i generated by U i as an example, where S K = h ( ( R I D i r i ) ( P S M I D j r j ) ) . Although A can intercept messages in the public channel, A cannot know R I D i , P S M I D j and r j , so A cannot figure out the correct S K . Similarly, even if A obtains r j generated by S j , it cannot figure out the correct S K . Therefore, even if A obtains the random number of any entity, it cannot break our protocol.
Replay Attacks. In our proposed protocol, each message delivered in the public channel contains a timestamp. When each entity receives a message, it first checks whether the timestamp is valid. The entity will perform subsequent calculations if the timestamp is within the valid range. Here, take message M 2 = { W 3 , V E D , T 2 } as an example. Suppose A intercepts the message M 2 and sends M 2 to S j repeatedly. When S j receiving M 2 sent by A, S j first checks | T 2 T s | Δ T . S j will terminate the session because the timestamp in message M 2 is not within the valid time range. Consequently, our proposed protocol can withstand replay attacks.
Mutual Authentication. In our proposed protocol, the validity of the entity is verified by the authentication value. The message passed in the public channel contains the authentication value, wherein
V U E = h ( R I D i X U T r i T 1 ) , V E D = h ( R I D i δ j X S T T 2 ) , V D E = h ( P S M I D j r j R I D i T 3 ) , V E U = h ( P S M I D j r j R I D i T 4 ) .
E G W through calculation of V U E verify the validity of U i , S j through calculation of V E D verify the validity of E G W , E G W through calculation of V D E verify the validity of S j , U i through calculation of V E U verify the validity of E G W . Therefore, our protocol can ensure that each entity realizes mutual authentication.
Anonymity and Untraceability. In our proposed protocol, random numbers and hash functions are used to hide the real identities of U i and S j . The pseudonym of U i and S j are used in the authentication process. Even if the attacker intercepts the messages M 1 , M 2 , M 3 and M 4 transmitted in the public channel, it cannot track the U i and S j . In addition, random numbers are different during each session, ensuring that U i and S j are not traceable. As a result, the proposed protocol can guarantee the anonymity and untraceability of entities.

4.3. ProVerif

ProVerif [64,65] is a formal simulation tool developed by Bruno Blanchett for automatically verifying cryptographic protocols. It describes cryptographic primitives, such as hash functions, fuzzy extraction, etc. In this paper, we use ProVerif software to simulate the smart home environment, mainly by executing code to simulate the registration and authentication process of U i , E G W , T T P , and S D j to verify the security of our protocol.
The symbols and operations used in ProVerif are defined in Figure 6a. We use ProVerif to query whether A can calculate S K through the information transmitted on the public channel. Our proposed protocol proof includes six events: event UserStarted(), event UserAuthed(), event EGWAcUser(), event SmartdeviceAcEGW(), event EGWAcSmartdevice(), and event UserAcEGW(), which indicate that U i starts authentication, U i completes authentication, E G W completes the authentication of the U i , S D j completes the authentication of the E G W , E G W completes the authentication of S D j , and U i completes the authentication of the E G W . The specific query and event definitions are shown in Figure 6b.
The process of ProVerif simulating U i , S D j , T T P , and E G W in Figure 6c–e. T T P includes two sub-processes: U i registration and S D j registration. “UiReg” represents the user registration phase, and “SDjReg” represents the smart device registration phase. ProVerif describes the detailed steps of each entity, such as the definition of new parameters and sending and receiving messages. Take the U i process as an example, where “new UIDi: bitstring” represents the definition of the U i identity, “out (sch, (PIDi, UPWi, ai))” represents that the U i sends messages to E G W , and “in (sch, (xR1: bitstring))” means that the U i receives messages sent from E G W . Finally, we use ProVerif to verify the proposed protocol, as shown in Figure 6f. We can conclude from the results that A cannot calculate S K , which proves that we propose a secure protocol.
According to the presentations in Section 4.1, Section 4.2 and Section 4.3, we demonstrated the security of our protocol in terms of formal proof (using RoR model), informal proof, and simulation software (ProVerif). The results show that the proposed authentication protocol can resist several well-known attacks, such as insider, gateway impersonation, session key disclosure, offline password guessing, and replay, and provides mutual authentication, anonymity, and untraceability.

5. Security and Performance Comparisons

In this section, we compare the proposed protocol with four existing related protocols [18,37,40,42] in terms of security and performance.

5.1. Security Comparisons

We compare the security of our proposed protocol with that of Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42]. Table 3 shows the security comparison results. ✓ demonstrates that the protocol can resist this attack, and × demonstrates that the protocol suffers from this attack. Shuai et al.’s protocol [37] suffers from insider attacks, gateway impersonation attacks, session key disclosure attacks, offline password guessing attacks, and replay attacks. Banerjee et al.’s protocol [40] cannot provide anonymity and untraceability. Yu et al.’s protocol [18] is unable to provide mutual authentication. Oh et al. [42] and our protocol can resist these attacks.

5.2. Performance Comparisons

We compare the performance from two aspects: computational cost and communication cost.

5.2.1. Computational Cost Comparisons

We compare and analyze the computational costs of each protocol in the login and authentication phase. Additionally, we perform simulation experiments to evaluate the computational cost of the protocol. We use HONOR Play3 to simulate users, Lenovo desktop to simulate edge gateway, and Lenovo laptop to simulate smart devices. The specific configuration of these three devices is shown in Table 4, where the operation time is obtained by averaging 20 times of operation. Here we will ignore hash and join operations. We can see the comparison results of the computational cost from Table 5. Because the running time of the fuzzy extractor is almost the same as that of the hash function, we use the hash function’s running time to represent the fuzzy extractor’s running time in the calculation cost comparison.
In the framework of the smart home environment, there can be multiple U i and S D j and only one edge gateway. We describe the relationship between the change in the number of entities and the calculated cost as follows. The relationship between the number of U i and the computational cost is shown in Figure 7. Shuai et al. [37] used point multiplication in the protocol, so the computational cost of this protocol is higher than that of other protocols. Yu et al. [18] used symmetric key encryption/decryption and fuzzy extractor in the protocol, and its computational cost is lower than that of Shuai et al. [37]. Moreover, the computational cost of other protocols is not different. The computational cost of E G W is shown in Figure 8. We can conclude from Figure 8 that the E G W computational cost of the proposed protocol is lower than that of other protocols. The relationship between the number of S D j and the computational cost is shown in Figure 9. We can conclude from Figure 9 that the S D j computational cost of the proposed protocol is lower than that of Oh et al.’s protocol [42], the same as that of Yu et al.’s protocol [18], but slightly higher than that of other protocols.

5.2.2. Communication Cost Comparisons

This part assumes that the length of timestamp, random number, identity, hash function, point multiplication, and symmetric encryption/decryption are 32, 128, 160, 256, 320, and 256 bits. Take our protocol as an example to explain the calculation process of communication cost. In our protocol, the messages transmitted in the public channel are M 1 = { W 1 , W 2 , P I D i , V U E , T 1 } , M 2 = { W 3 , V E D , T 2 } , M 3 = { W 4 , V D E , T 3 } , M 4 = { W 5 , V E U , T 4 } . Where, P I D i is the identity, { W 1 , W 2 , W 3 , W 4 , W 5 } are random numbers, { V U E , V E D , V D E , V E U } are hash functions, { T 1 , T 2 , T 3 , T 4 } are time stamps. It is calculated that the communication cost of our protocol is 1952 bits. The communication costs of Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42] are 2016, 1696, 1792, and 2368 bits, respectively. We can draw a conclusion from Table 6 and Figure 10 that the communication cost of the proposed protocol is lower than that of Shuai et al. [37] and Oh et al. [42], and slightly higher than that of Banerjee et al. [40] and Yu et al. [18].

6. Conclusions

Communication security is an essential factor for the sustainable development of smart homes. It ensures that users can obtain secure smart home services and protects users’ privacy. Due to the openness of wireless channels prone to data leakage, using cryptographic methods to ensure communication security has attracted many researchers’ attention. To the best of our knowledge, we introduce the first edge-computing-based smart home architecture. Meanwhile, based on this architecture, a PUF-based authentication protocol is proposed. Precisely, the properties of PUF are provided to resist physical tampering and biological cloning attacks. The standard security verification approaches which are formal security analysis using RoR model, informal security analysis, and ProVerif simulation software are made to demonstrate the security of our protocol. The security and performance comparisons are indicated that our protocol has higher security and slightly better performance. In the future, we will adopt several lightweight cryptographic operations to design the new authentication protocol in smart home environments. Without loss of security, the new protocol is more suitable for users’ IoT devices.

Author Contributions

Conceptualization, T.-Y.W.; methodology, T.-Y.W. and F.K.; software, L.W.; formal analysis, Y.-C.C.; investigation, S.K. and J.-S.P.; writing—original draft preparation, T.-Y.W., F.K., L.W., Y.-C.C., S.K. and J.-S.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data is included in the article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IoTInternet of Things
RORReal or random
RARegistration authority
PUFPhysical unclonable functions
AKAAuthentication and key agreement
ECCElliptic curve cryptography

References

  1. Chen, X.; Zhang, J.; Lin, B.; Chen, Z.; Wolter, K.; Min, G. Energy-efficient offloading for DNN-based smart IoT systems in cloud-edge environments. IEEE Trans. Parallel Distrib. Syst. 2021, 33, 683–697. [Google Scholar] [CrossRef]
  2. Shen, S.; Yang, Y.; Liu, X. Toward data privacy preservation with ciphertext update and key rotation for IoT. Concurr. Comput. Prac. Exp. 2021, e6729. [Google Scholar] [CrossRef]
  3. Namasudra, S. A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure. Comput. Electr. Eng. 2022, 104, 108426. [Google Scholar] [CrossRef]
  4. Wu, T.Y.; Meng, Q.; Kumari, S.; Zhang, P. Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments. Sensors 2022, 22, 3858. [Google Scholar] [CrossRef] [PubMed]
  5. Yu, Z.; Zheng, X.; Huang, F.; Guo, W.; Sun, L.; Yu, Z. A framework based on sparse representation model for time series prediction in smart city. Front. Comput. Sci. 2021, 15, 1–13. [Google Scholar] [CrossRef]
  6. Huang, H.; Lu, S.; Wu, Z.; Wei, Q. An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–21. [Google Scholar] [CrossRef]
  7. Luo, Y.; Zheng, W.M.; Chen, Y.C. An anonymous authentication and key exchange protocol in smart grid. J. Netw. Intell. 2021, 6, 206–215. [Google Scholar]
  8. Liu, S.; Chen, C.M. Comments on “A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance”. IEEE Trans. Intell. Transp. Syst. 2022. [Google Scholar] [CrossRef]
  9. Yang, Y.; Zheng, X.; Guo, W.; Liu, X.; Chang, V. Privacy-preserving fusion of IoT and big data for e-health. Future Gener. Comput. Syst. 2018, 86, 1437–1455. [Google Scholar] [CrossRef] [Green Version]
  10. Wu, T.Y.; Yang, L.; Luo, J.N.; Ming-Tai Wu, J. A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments. Secur. Commun. Netw. 2021, 2299632. [Google Scholar] [CrossRef]
  11. Das, S.; Namasudra, S. MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure. Int. J. Netw. Manag. 2022. [Google Scholar] [CrossRef]
  12. Jiang, Q.; Zhang, X.; Zhang, N.; Tian, Y.; Ma, X.; Ma, J. Two-factor authentication protocol using physical unclonable function for IoV. In Proceedings of the 2019 IEEE/CIC International Conference on Communications in China (ICCC), Changchun, China, 11–13 August 2019; pp. 195–200. [Google Scholar] [CrossRef]
  13. Yu, S.; Lee, J.; Park, K.; Das, A.K.; Park, Y. IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access 2020, 8, 167875–167886. [Google Scholar] [CrossRef]
  14. Chaudhry, S.A. Combating identity de-synchronization: An improved lightweight symmetric key based authentication scheme for IoV. J. Netw. Intell. 2021, 6, 656–667. [Google Scholar]
  15. Kumar, V.; Kumar, R.; Kumar, V.; Kumari, A.; Kumari, S. RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing. J. Netw. Intell. 2022, 7, 526–543. [Google Scholar]
  16. Li, Z.; Miao, Q.; Chaudhry, S.A.; Chen, C.M. A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles. Int. J. Distrib. Sens. Netw. 2022, 18, 15501329221104332. [Google Scholar] [CrossRef]
  17. Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J. Netw. Syst. Manag. 2019, 27, 1020–1042. [Google Scholar] [CrossRef]
  18. Yu, S.; Jho, N.; Park, Y. Lightweight three-factor-based privacy-preserving authentication scheme for iot-enabled smart homes. IEEE Access 2021, 9, 126186–126197. [Google Scholar] [CrossRef]
  19. Tanveer, M.; Abbas, G.; Abbas, Z.H.; Bilal, M.; Mukherjee, A.; Kwak, K.S. LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes. IEEE Internet Things J. 2021, 9, 2578–2591. [Google Scholar] [CrossRef]
  20. Xue, X.; Jiang, C. Matching sensor ontologies with multi-context similarity measure and parallel compact differential evolution algorithm. IEEE Sens. J. 2021, 21, 24570–24578. [Google Scholar] [CrossRef]
  21. Xue, X.; Huang, Q. Generative adversarial learning for optimizing ontology alignment. Expert Syst. 2022. [Google Scholar] [CrossRef]
  22. Yang, Y.; Zheng, X.; Chang, V.; Ye, S.; Tang, C. Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimed. Tools Appl. 2018, 77, 9927–9941. [Google Scholar] [CrossRef]
  23. Zhang, J.; Li, M.; Chen, Z.; Lin, B. Computation offloading for object-oriented applications in a UAV-based edge-cloud environment. J. Supercomput. 2022, 78, 10829–10853. [Google Scholar] [CrossRef]
  24. Wu, T.Y.; Wang, L.; Guo, X.; Chen, Y.C.; Chu, S.C. SAKAP: SGX-Based Authentication Key Agreement Protocol in IoT-Enabled Cloud Computing. Sustainability 2022, 14, 11054. [Google Scholar] [CrossRef]
  25. Cao, K.; Liu, Y.; Meng, G.; Sun, Q. An overview on edge computing research. IEEE Access 2020, 8, 85714–85728. [Google Scholar] [CrossRef]
  26. Li, Y.; Cheng, Q.; Liu, X.; Li, X. A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Syst. J. 2020, 15, 935–946. [Google Scholar] [CrossRef]
  27. Chen, X.; Chen, S.; Ma, Y.; Liu, B.; Zhang, Y.; Huang, G. An adaptive offloading framework for android applications in mobile edge computing. Sci. China Inf. Sci. 2019, 62, 1–17. [Google Scholar] [CrossRef]
  28. Liu, G.; Chen, X.; Zhou, R.; Xu, S.; Chen, Y.C.; Chen, G. Social learning discrete Particle Swarm Optimization based two-stage X-routing for IC design under Intelligent Edge Computing architecture. Appl. Soft Comput. 2021, 104, 107215. [Google Scholar] [CrossRef]
  29. Wu, T.Y.; Meng, Q.; Yang, L.; Guo, X.; Kumari, S. A provably secure lightweight authentication protocol in mobile edge computing environments. J. Supercomput. 2022, 78, 13893–13914. [Google Scholar] [CrossRef]
  30. Pappu, R.; Recht, B.; Taylor, J.; Gershenfeld, N. Physical one-way functions. Science 2002, 297, 2026–2030. [Google Scholar] [CrossRef] [Green Version]
  31. Tahavori, M.; Moazami, F. Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. Peer-to-Peer Netw. Appl. 2020, 13, 1616–1628. [Google Scholar] [CrossRef]
  32. Jeong, J.; Chung, M.Y.; Choo, H. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Walkoloa, HI, USA, 7–10 January 2008; p. 294. [Google Scholar] [CrossRef]
  33. Vaidya, B.; Park, J.H.; Yeo, S.S.; Rodrigues, J.J. Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 2011, 34, 326–336. [Google Scholar] [CrossRef]
  34. Kim, H.J.; Kim, H.S. AUTH HOTP-HOTP based authentication scheme over home network environment. In Proceedings of the International Conference on Computational Science and Its Applications, Santander, Spain, 20–23 June 2011; pp. 622–637. [Google Scholar] [CrossRef]
  35. Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans. Dependable Secur. Comput. 2017, 17, 391–406. [Google Scholar] [CrossRef]
  36. Lyu, Q.; Zheng, N.; Liu, H.; Gao, C.; Chen, S.; Liu, J. Remotely access “my” smart home in private: An anti-tracking authentication and key agreement scheme. IEEE Access 2019, 7, 41835–41851. [Google Scholar] [CrossRef]
  37. Shuai, M.; Yu, N.; Wang, H.; Xiong, L. Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 2019, 86, 132–146. [Google Scholar] [CrossRef]
  38. Kaur, D.; Kumar, D. Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. J. Inf. Secur. Appl. 2021, 58, 102787. [Google Scholar] [CrossRef]
  39. Alzahrani, B.A.; Barnawi, A.; Albarakati, A.; Irshad, A.; Khan, M.A.; Chaudhry, S.A. SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes. Wirel. Commun. Mob. Comput. 2022, 2022, 8669941. [Google Scholar] [CrossRef]
  40. Banerjee, S.; Odelu, V.; Das, A.K.; Chattopadhyay, S.; Park, Y. An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 2020, 20, 1215. [Google Scholar] [CrossRef] [Green Version]
  41. Fadi, A.T.; Deebak, B.D. Seamless authentication: For IoT-big data technologies in smart industrial application systems. IEEE Trans. Ind. Inform. 2020, 17, 2919–2927. [Google Scholar]
  42. Oh, J.; Yu, S.; Lee, J.; Son, S.; Kim, M.; Park, Y. A secure and lightweight authentication protocol for IoT-based smart homes. Sensors 2021, 21, 1488. [Google Scholar] [CrossRef]
  43. Tsai, J.L.; Lo, N.W. A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 2015, 9, 805–815. [Google Scholar] [CrossRef]
  44. Jiang, Q.; Ma, J.; Wei, F. On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 2016, 12, 2039–2042. [Google Scholar] [CrossRef]
  45. Irshad, A.; Sher, M.; Ahmad, H.F.; Alzahrani, B.A.; Chaudhry, S.A.; Kumar, R. An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. (TIIS) 2016, 10, 5529–5552. [Google Scholar]
  46. Xiong, L.; Peng, D.; Peng, T.; Liang, H. An enhanced privacy-aware authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. (TIIS) 2017, 11, 6169–6187. [Google Scholar]
  47. Jia, X.; He, D.; Kumar, N.; Choo, K.K.R. A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 2019, 14, 560–571. [Google Scholar] [CrossRef]
  48. Kaur, K.; Garg, S.; Kaddoum, G.; Guizani, M.; Jayakody, D.N.K. A lightweight and privacy-preserving authentication protocol for mobile edge computing. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  49. Aysu, A.; Gulcan, E.; Moriyama, D.; Schaumont, P.; Yung, M. End-to-end design of a PUF-based privacy preserving authentication protocol. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Saint-Malo, France, 13–16 September 2015; pp. 556–576. [Google Scholar] [CrossRef]
  50. Chatterjee, U.; Chakraborty, R.S.; Mukhopadhyay, D. A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 2017, 16, 1–25. [Google Scholar] [CrossRef]
  51. Braeken, A. PUF based authentication protocol for IoT. Symmetry 2018, 10, 352. [Google Scholar] [CrossRef] [Green Version]
  52. Gope, P.; Das, A.K.; Kumar, N.; Cheng, Y. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 2019, 15, 4957–4968. [Google Scholar] [CrossRef]
  53. Chen, S.; Li, B.; Chen, Z.; Zhang, Y.; Wang, C.; Tao, C. Novel Strong-PUF-based Authentication Protocols Leveraging Shamir’s Secret Sharing. IEEE Internet Things J. 2021, 9, 14408–14425. [Google Scholar] [CrossRef]
  54. Ebrahimabadi, M.; Younis, M.; Karimi, N. A PUF-based modeling-attack resilient authentication protocol for IoT devices. IEEE Internet Things J. 2021, 9, 3684–3703. [Google Scholar] [CrossRef]
  55. Yu, S.; Das, A.K.; Park, Y.; Lorenz, P. SLAP-IoD: Secure and Lightweight Authentication Protocol Using Physical Unclonable Functions for Internet of Drones in Smart City Environments. IEEE Trans. Veh. Technol. 2022, 71, 10374–10388. [Google Scholar] [CrossRef]
  56. Shao, X.; Guo, Y.; Guo, Y. A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wirel. Netw. 2022, 28, 3753–3770. [Google Scholar] [CrossRef]
  57. Abdalla, M.; Fouque, P.A.; Pointcheval, D. Password-based authenticated key exchange in the three-party setting. In Proceedings of the International Workshop on Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2005; pp. 65–84. [Google Scholar] [CrossRef] [Green Version]
  58. Wu, T.Y.; Lee, Z.; Yang, L.; Luo, J.N.; Tso, R. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks. J. Supercomput. 2021, 77, 6992–7020. [Google Scholar] [CrossRef]
  59. Wu, T.Y.; Meng, Q.; Yang, L.; Kumari, S.; Nia, M.P. Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment. Comput. Model. Eng. Sci. 2023, 134, 317–341. [Google Scholar] [CrossRef]
  60. Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  61. Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2001; pp. 453–474. [Google Scholar] [CrossRef] [Green Version]
  62. Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
  63. Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s law in passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
  64. Blanchet, B. An efficient cryptographic protocol verifier based on prolog rules. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, 11–13 June 2001; Volume 1, pp. 82–96. [Google Scholar]
  65. Yang, L.; Chen, Y.C.; Wu, T.Y. Provably Secure Client-Server Key Management Scheme in 5G Networks. Wirel. Commun. Mob. Comput. 2021, 4083199. [Google Scholar] [CrossRef]
Figure 1. Traditional architecture of smart home.
Figure 1. Traditional architecture of smart home.
Sensors 22 09174 g001
Figure 2. System model.
Figure 2. System model.
Sensors 22 09174 g002
Figure 3. U i registration phase.
Figure 3. U i registration phase.
Sensors 22 09174 g003
Figure 4. S D j registration phase.
Figure 4. S D j registration phase.
Sensors 22 09174 g004
Figure 5. Login and authentication phase.
Figure 5. Login and authentication phase.
Sensors 22 09174 g005
Figure 6. Simulation process in ProVerif. (a) Definitions; (b) the queries and events; (c) execution process of U i ; (d) execution process of S D j ; (e) execution process of T T P and E G W ; (f) verification results.
Figure 6. Simulation process in ProVerif. (a) Definitions; (b) the queries and events; (c) execution process of U i ; (d) execution process of S D j ; (e) execution process of T T P and E G W ; (f) verification results.
Sensors 22 09174 g006
Figure 7. The computational cost of users. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Figure 7. The computational cost of users. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Sensors 22 09174 g007
Figure 8. The computational cost of EGW. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Figure 8. The computational cost of EGW. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Sensors 22 09174 g008
Figure 9. The computational cost of smart devices. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Figure 9. The computational cost of smart devices. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Sensors 22 09174 g009
Figure 10. Comparisons of communication cost. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Figure 10. Comparisons of communication cost. Shuai et al. [37], Banerjee et al. [40], Yu et al. [18], and Oh et al. [42].
Sensors 22 09174 g010
Table 1. The summary of authentication protocols.
Table 1. The summary of authentication protocols.
ProtocolsCryptographic Techniques and PropertiesLimitations
Yu et al. [18](1) Utilized one-way hash function
(2) Utilized symmetric encryption
(1) Cannot provide mutual authentication
Jeong et al. [32](1) Utilized one-way hash function
(2) Based on one-time password
(1) Cannot resist insider attacks
(2) Cannot guarantee user anonymity
Vaidya et al. [33](1) Utilized one-way hash function
(2) Utilized symmetric encryption
(3) Utilized HMAC-based one-time password algorithm
(4) Based on smart card
(1) Cannot resist provide perfect forward security
(2) Cannot resist stolen smart card attacks
Wazid et al. [35](1) Utilized one-way hash function
(2) Utilized symmetric encryption
(1) Cannot resist stolen verifier attacks
(2) Cannot resist synchronization attacks
Shuai et al. [37](1) Utilized ECC
(2) Utilized one-way hash function
(3) Anonymity
(1) Cannot resist insider attacks
(2) Cannot resist replay attacks
(3) Cannot resist offline password guessing attacks
Kaur and Kumar [38](1) Utilized one-way hash function
(2) Based on smart card
(3) Utilized ECC
(4) Two-factor
(1) Cannot resist impersonation attacks
(2) Cannot resist ssession key disclosure attacks
Jia et al. [47](1) Utilized one-way hash function
(2) Utilized ECC
(3) Utilize bilinear pairing
(1) Cannot resist MITM attacks
Chen et al. [53](1) Utilized one-way hash function
(2) Based on PUF
(3) Utilized Shamir’s secret sharing
Banerjee et al. [40](1) Utilized one-way hash function(1) Cannot guarantee user anonymity and untraceability
Oh et al. [42](1) Utilized one-way hash function
(2) Based on smart card
Table 2. Notations.
Table 2. Notations.
NotationsDescription
U i ith user
S D j jth smart device
U I D i Identity of U i
P I D i Pseudo-identities of U i
U P W i Password of U i
T T P Trusted third party
E G W Edge gateway
S M I D j Identity of S D j
xPrivate key of T T P
G e n ( · ) Fuzzy extractor probabilistic generation
R e p ( · ) Reproduction function
P U F ( · ) PUF function
S K Session key
h ( · ) Secure-hash function
| | Concatenation operation
XOR operation
Table 3. Comparison of security.
Table 3. Comparison of security.
Security Properties[37][40][18][42]Ours
Insider Attacks×
Gateway Impersonation Attacks×
Session Key Disclosure Attacks×
Offline Password Guessing Attacks×
Replay Attacks×
Mutual Authentication×
Anonymity and untraceability××××
Table 4. Configuration parameters and running time of equipment.
Table 4. Configuration parameters and running time of equipment.
HONOR Play3Lenovo DesktopLenovo Laptop
Operating SystemAndroid SystemWindows 10Windows 10
Running Memory4G16G8G
CPUHUAWEI Kirin 710FIntel(R) Core(TM) i5-Intel(R) Core(TM) i7-
9500 CPU @ 3.00 GHz6700HQ CPU @ 2.60 GHz
Hash Function0.0041 ms0.0024 ms0.0035 ms
Point Multiplication0.5354 ms0.3354 ms0.4129 ms
Point Addition0.1604 ms0.0633 ms0.0977 ms
Table 5. Computational cost comparison.
Table 5. Computational cost comparison.
Protocols U i (ms) EGW (ms) SD j (ms)
Shuai et al. [37] 2 T C + 6 T H 1.095 T C + 7 T H 0.556 3 T H 0.012
Banerjee et al. [40] 10 T H + T P 0.045 9 T H 0.22 4 T H 0.014
Yu et al. [18] T D + 12 T H + T P 0.309 11 T H 0.045 7 T H 0.029
Oh et al. [42] 16 T H 0.066 15 T H 0.036 8 T H 0.028
Our 9 T H 0.037 5 T H 0.020 6 T H + T P 0.029
Here, TC represents the execution time of ECC point multiplication, TD represents the execution time of symmetric encryption/decryption operation, TH represents the running time of hash function, and TP represents the execution time of the fuzzy extraction function.
Table 6. Communication cost comparison.
Table 6. Communication cost comparison.
ProtocolsRoundsCommunication Cost
Shuai et al. [37]42016 bits
Banerjee et al. [40]41696 bits
Yu et al. [18]41792 bits
Oh et al. [42]52368 bits
Our41952 bits
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, T.-Y.; Kong, F.; Wang, L.; Chen, Y.-C.; Kumari, S.; Pan, J.-S. Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm. Sensors 2022, 22, 9174. https://doi.org/10.3390/s22239174

AMA Style

Wu T-Y, Kong F, Wang L, Chen Y-C, Kumari S, Pan J-S. Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm. Sensors. 2022; 22(23):9174. https://doi.org/10.3390/s22239174

Chicago/Turabian Style

Wu, Tsu-Yang, Fangfang Kong, Liyang Wang, Yeh-Cheng Chen, Saru Kumari, and Jeng-Shyang Pan. 2022. "Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm" Sensors 22, no. 23: 9174. https://doi.org/10.3390/s22239174

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop