Abstract
Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from sensor data. However, wearable computing environments can be fragile to cyber security attacks since adversaries attempt to block, delete, or intercept the exchanged information via insecure communication channels. In addition to cyber security attacks, wearable sensor devices cannot resist physical threats since they are batched in unattended circumstances. Furthermore, existing schemes are not suited for resource-constrained wearable sensor devices with regard to communication and computational costs and are inefficient regarding the verification of multiple sensor devices simultaneously. Thus, we designed an efficient and robust authentication and group–proof scheme using physical unclonable functions (PUFs) for wearable computing, denoted as AGPS-PUFs, to provide high-security and cost-effective efficiency compared to the previous schemes. We evaluated the security of the AGPS-PUF using a formal security analysis, including the ROR Oracle model and AVISPA. We carried out the testbed experiments using MIRACL on Raspberry PI4 and then presented a comparative analysis of the performance between the AGPS-PUF scheme and the previous schemes. Consequently, the AGPS-PUF offers superior security and efficiency than existing schemes and can be applied to practical wearable computing environments.
1. Introduction
With the development of “mobile and 5G communication” technologies, wearable computing is emerging as a new ubiquitous technology within the Internet of Things (IoT) and it has garnered a lot of attention from both scientific and academic communities [1,2,3]. The wearable devices are integrated into various types of accessories and clothing and provide useful application services in various fields, including “military, healthcare, and industry”. In particular, sustainable wearable computing technology offers innovative healthcare opportunities, which give new methods to medical professionals to treat patients. For instance, wearable computing-based healthcare systems reduce healthcare costs and provide various medical services, including “monitoring, medical consultation, and emergency treatment” [4].
In these environments, wearable devices collect medical data, including “asthma level, blood pressure, electrocardiogram, body temperature” from the patients, and then transmit the corresponding data to the paired mobile terminal. The mobile terminal transmits the received data to the trusted cloud server, and authorized medical professionals remotely connect to the trusted cloud server and precisely monitor, analyze, and diagnose the health data of patients stored within the server. However, despite the numerous advantages of wearable computing, there are several difficulties and challenges that need to be addressed [5]. In wearable computing environments, serious security and privacy issues may arise since the messages are transmitted via an insecure channel [6]. If the collected data from the wearable devices are exposed, an adversary can obtain the sensitive information of legitimate patients and may attempt potential cyber security attacks. Hence, adversaries can bring many unexpected threats and jeopardize the patients’ lives by transmitting false medical diagnoses, such as “treatments and medications”. In addition to cyber security attacks, wearable devices cannot prevent physical threats since they are deployed in hostile and unattended circumstances. Furthermore, considering the resource limitations of wearable devices, it is suitable to adopt lightweight cryptographic primitives, such as “hash functions and symmetric key cryptography that require low computation and communication costs [7]”. In wearable computing environments, it is essential to identify whether data collected from multiple wearable devices belong to the same authorized user. Thus, a lightweight privacy-preserving authentication and group–proof scheme is indispensable to ensure simultaneous identification and secure communication in wearable computing environments.
Recently, Guo et al. [8] presented an “anonymous authenticated key agreement and group–proof protocol for wearable computing” to provide secure communication and simultaneous identification. Guo et al. claimed that their scheme was protected against physical/cyber security attacks, including “physical wearable device capture, impersonation, and forgery” attacks, and guaranteed “secure mutual authentication and untraceability”. Unfortunately, we prove that Guo et al.’s scheme was not protected against security attacks, such as “session key disclosure, man-in-the-middle (MITM), and impersonation” attacks, and it does not offer several security properties, including “untraceability and mutual authentication”. Hence, we present a “new efficient and robust authentication and group–proof scheme using physical unclonable functions (PUF) for wearable computing”, denoted as AGPS-PUFs, to address the security issues of Guo et al.’s scheme [8].
1.1. Motivations
The main purpose of this paper is to identify and improve the security problems of Guo et al.’s scheme based on the threat model presented by them. This paper proves that their protocol [8] is not protected against lethal security attacks and does not offer sensitive security features in wearable computing environments. Guo et al. [8] designed a high-security-supported cryptographic and efficient group–proof scheme for wearable computing. However, they should have examined their protocol from the point of view that we analyzed and proved. This fact motivated us to design a “new efficient and robust authentication and group–proof scheme using PUF for wearable computing”. This scheme is resilient to lethal security attacks and drawbacks that exist in wearable computing environments while guaranteeing security functionalities.
1.2. Research Contributions
This section introduces the main contribution of the AGPS-PUF.
- The AGPS-PUF is specifically designed to improve the security vulnerabilities of Guo et al.’s scheme and offers reliable authentication and maintenance for wearable computing. The AGPS-PUF carries out mutual authentication between a mobile user and wearable devices through a trusted entity known as the cloud server. The PUF enables wearable devices to resist tampering, including physical security attacks.
- We propose the protocol and demonstrate its effectiveness and security strengths via informal and formal security analyses. We exploited the well-known “AVISPA simulation” [9] and “ROR Oracle model” [10].
- We prove that the AGPS-PUF offers efficient performance in terms of security functionalities and overheads, as compared to previous schemes explored in the literature.
1.3. Paper Outlines
The rest of the paper is organized as follows. Section 2 presents the related works for wearable computing environments. Section 3 introduces the preliminaries. In Section 4 and Section 5, we review Guo et al.’s scheme [8] and then prove the security shortcomings of Guo et al.’s scheme. Section 6 designs a “new PUF-based privacy-preserving authentication and group–proof scheme for wearable computing” to resolve the security problems of Guo et al.’s scheme. Section 7 analyzes the security of the AGPS-PUF when performing formal and informal security analyses. Section 8 introduces the testbed experiments for cryptographic operations using MIRACL crypto SDK. Section 9 analyzes the performance comparison of the AGPS-PUF with related schemes. Finally, Section 10 summarizes the future works and conclusions of this paper.
2. Related Works
Over the last few years, many authentication and key agreement (AKA) schemes have been presented for wearable computing to ensure privacy for legitimate users [11,12,13]. The public key cryptosystem (PKC)-based AKA schemes consist of three mechanisms: “traditional PKC scheme [14], identity-based PKC scheme [15], and certificateless PKC scheme [16]”. The traditional PKC scheme faces problems in managing user certificates and needs high computing capabilities, so it is not applicable to wearable computing environments with constrained resources. Identity-based PKC schemes deal with the difficulty of certificate management; however, they are presented for server–client environments. The certificateless PKC scheme enhances the key escrow problem of the identity-based PKC scheme and prevents certificate management and delivery problems from the traditional PKC scheme [17]. However, these existing PKC-based AKA schemes [14,15,16] are not suitable for wearable computing environments because they utilize PKC, such as elliptic curve cryptography (ECC) and bilinear pairing, which require high communication and computation overheads.
The design of a lightweight AKA scheme for wearable computing environments has garnered a lot of attention due to the efficiency problem of the PKC-based AKA scheme and constrained resources for IoT and sensor devices. The lightweight AKA scheme has two main features: “password-based two-factor AKA scheme or password and biometric-based three-factor AKA scheme”. These AKA schemes utilize lightweight cryptographic primitives, including the “one-way hash function, XOR operation, and symmetric key cryptography”. Recently, numerous lightweight AKA schemes [18,19,20] were designed for wearable computing environments to provide useful services with lightweight properties. Li et al. [21] proposed a “secure AKA scheme with user anonymity and lightweight for healthcare applications” in wireless medical sensor networks (WMSN). Unfortunately, Das et al. [22] demonstrated that Li et al.’s scheme [21] is insecure to “privileged insider and sensor node capture” attacks and fails to ensure “user anonymity”. Wu et al. [23] presented an “enhanced two-factor assisted AKA scheme in WMSN environments”. Wu et al. [23] claimed that their protocol is resilient to lethal security attacks and offers the necessary security features. Unfortunately, Srinivas et al. [24] proved that their scheme [23] is not resistant to lethal security attacks, such as “stolen smart card, offline password guessing, user impersonation, and denial of service (DoS)” attacks. Srinivas et al. [24] proposed an “efficient and reliable AKA scheme for healthcare services with WMSN” to address the security weaknesses of Wu et al.’s scheme [23]. Amin et al. [25] designed a “lightweight and anonymous two-factor based AKA scheme” to provide secure patient data in patient monitoring systems for WMSN. Unfortunately, Ali et al. [26] analyzed Amin et al.’s scheme [25] and found that it does not prevent “known-session key temporary information, user impersonation, and offline password guessing” attacks. Ali et al. [26] presented an “enhanced biometric-based three-factor AKA scheme for healthcare monitoring in WMSN” to resolve the security shortcomings of Amin et al.’s scheme [25]. Gupta et al. [27] designed a “lightweight AKA scheme for wearable devices with user anonymity”. Gupta et al.’s scheme [27] has high scalability because the wearable sensing device registration phase does not need a secure channel. However, Hajian et al. [28] proved that Gupta et al.’s scheme [27] is not resistant to lethal security attacks, including “compromise sensing device, desynchronization, and privileged insider” attacks. Hajian et al. [28] proposed a “scalable and lightweight three-factor based AKA scheme with user-friendly and anonymous for wearable sensing devices” to improve the security problems of Gupta et al.’s scheme [27]. However, Yu et al. [29] pointed out that their protocol [28] is still not resistant to “mobile device stolen”, “session key disclosure, MITM, impersonation” attacks and does not guarantee “mutual authentication”. Unfortunately, these lightweight AKA schemes for wearable computing do not identify whether the collected data from multiple wearable devices belong to the same authorized user.
Guo et al. [8] designed an “anonymous and lightweight AKA and group–proof scheme for wearable computing”, which can verify that multiple wearable devices belong to the same user. Guo et al. [8] claimed that their protocol ensures secure data transmission between each entity and is resilient to lethal security attacks. However, based on the threat model presented by them, we have proven that Guo et al.’s scheme [8] is vulnerable to lethal security threats, such as “impersonation, MITM, and session key disclosure” attacks, and does not offer several security properties, such as “untraceability and mutual authentication”. In addition to cyber security attacks, wearable devices may be fragile to physical threats since they are batched in insecure circumstances. Therefore, we propose an “efficient and robust authentication and group-proof scheme using the PUF for wearable computing” to supplement the security functionalities and address the security shortcomings of Guo et al.’s scheme [8].
3. Preliminaries
The following provides an overview of the preliminaries.
3.1. Threat Model
We introduce the adversary capabilities based on the “Dolev-Yao (DY) model” [30,31].
- An adversary (henceforth denoted as ) can “resend, eavesdrop, block, and delete” the exchanged messages over an insecure channel.
- can steal the mobile device () and the wearable device () of the legitimate user. However, cannot simultaneously capture the and of the legitimate user. The cloud server and registration center are trusted authorities and cannot be compromised by .
- can extract the secret information stored in the captured or by performing the “power-analysis attacks” [32] and “physical capture attacks” [33].
3.2. PUF
The PUF [34,35] is a physical circuit that manufactures an output of a physical microstructure. The PUF does not store a private key in the smart device and it is extremely difficult to clone the circuit. The PUF utilizes an input/output bit string pair, denoted as the challenge/response pair. Even if various challenges occur in the PUF circuit, each has a unique output response. The PUF preserves smart devices in IoMT-enabled TMIS environments from side-channel and tampering threats. The PUF is expressed through a process denoted as , where C and R are the challenge/response. The following are several properties of the PUF.
- The PUF is easy to implement and evaluate.
- The PUF relies on the system’s physical microstructure.
- Any attempt to tamper with a smart device that contains the PUF will update the behavior of the PUF and, thus, destroy it [36].
Figure 1 shows a “PUF-based key generator procedure”. As shown in Figure 1, the PUF generates strong extractors for a private secret key based on various functions, including “encode, decode, and key derivation” functions. Thus, the PUF makes it impossible for attackers to perform lethal physical threats. Moreover, these properties combine to make a “good solution for the robust and efficient authentication of lightweight devices in wearable computing environments”.
Figure 1.
Key generator mechanism of the PUF.
3.3. System Model
This section introduces an overview of the system model (see Figure 2) of this paper. The system model for wearable computing is composed of four entities: registration center, cloud server, mobile users, and wearable devices.
Figure 2.
System model for wearable computing.
- Registration center: This entity is a trusted authority that registers wearable devices and mobile users in a secure channel. Moreover, the registration center sets the secret credentials of each wearable device before being batched in wearable computing environments.
- Cloud server: This entity is also a trusted authority. The cloud server stores and shares the health data of legitimate patients and has computational and storage capabilities to manage patients’ health data.
- Mobile users: They have a mobile terminal and wear wearable devices to analyze the health status of the patients. The mobile terminal receives health data from the wearable devices, and then sends the received data to the cloud server through wireless communications. Moreover, remote authorized users access the cloud server to analyze the patients’ data and provide accurate medical diagnoses based on the stored physiological data.
- Wearable device: Wearable devices track and collect health data from corresponding body parts of patients. Then, the collected data are transmitted to the paired mobile terminal via Bluetooth.
4. Review of Guo et al.’s Scheme
This section introduces the reviews of Guo et al.’s scheme [8]. Table 1 shows the notations utilized in this article.
Table 1.
Notations.
4.1. System Setup Phase
In this section, denotes the secret credentials of each .
- SP-1:
- select s a master private key for .
- SP-2:
- chooses a unique identity for each and computes the pseudo-identity . After that, generates a temporary identity for each .
- SP-3:
- stores in ’s secure database and then stores in the memory of .
4.2. User Registration Phase
In this phase, registers with and obtains certain secret information to utilize later for authentication.
- URP-1:
- selects and at and . After that, generates a random number and computes and . Then, sends to over a secure channel.
- URP-2:
- selects a temporary identity and a random number . After that, calculates , , , . Finally, stores in ’s secure database and then sends to over a secure channel.
- URP-3:
- computes , , , and . Finally, stores in its memory.
4.3. Login and Authentication Phase
In this phase, all participants authenticate each other and establish a common session key.
- LAP-1:
- first inputs and into . After that, computes , , , , , and , and checks . If it matches, generates a random nonce and a current timestamp and then transmits to over an insecure channel.
- LAP-2:
- verifies the freshness of , where is the current timestamp and is the maximum transmission delay for the message to be transmitted between and . If they match, selects and computes to transmit the secret parameters securely, and to verify the authorized entity. After that, transmits to .
- LAP-3:
- checks the freshness of . If the condition is met, selects and computes , to transmit the random nonce securely, to verify the authorized entity, to transmit the secret parameters securely, and to verify the authorized entity, and sends to over an insecure channel.
- LAP-4:
- verifies the freshness of . If it matches, retrieves in the database. There are three scenarios for . The first scenario is , indicating that and did not correctly update the temporary identity of in the previous session. The second scenario is , indicating that and correctly updated the temporary identity of in the previous session. In the third scenario, there is no matching of in the database, and the authentication phase is terminated. For the first two scenarios, obtains , corresponding to in its database. After that, computes , , , , and , and verifies and . If they are not equal, the authentication phase is terminated. Otherwise, successfully authenticates and then updates the temporary identity of . For the second scenario, ’s new temporary identity remains unchanged for the time being and is updated later in the session.
- LAP-5:
- retrieves in its database. Similar to LAP-4, there are three scenarios: , , or cannot be found in the database. In the first two scenarios, obtains , corresponding to in its database, and then computes , , , and , and checks . If it matches, successfully authenticates . Then, updates the temporary identity of as it updates ’s temporary identity.
- LAP-6:
- selects and timestamp . After that, computes to transmit the secret parameters securely, to transmit the secret parameters securely, , to verify the authorized entity, , to verify the authorized entity, and . selects the new temporary identities and for and , and then changes and in its database. Then, calculates and and transmits to over an insecure channel.
- LAP-7:
- verifies the freshness of . If it matches, calculates , , , , , and , and then checks whether and . If they are valid, authenticates . After that, stores the session keys, and , and the new temporary identity, .
- LAP-8:
- selects and computes to transmit the secret parameters securely, to transmit the secret parameters securely, to verify the authorized entity, and then transmits to .
- LAP-9:
- verifies the freshness . If it matches, computes , , , and , and then checks whether . If it matches, authenticates successfully. Finally, stores a session key and a new temporary identity .
5. Security Flaws of Guo et al.’s Scheme
In this section, we prove that Guo et al.’s scheme [8] is not protected against the lethal security threats and cannot offer several security functionalities.
5.1. Impersonation Attack
According to Section 3.1, can extract the secret credentials stored in . Moreover, can intercept, block, modify, replay, and delete the exchanged messages over an insecure channel. In this attack, attempts to impersonate a legitimate entity.
- Step 1: first calculates and a new random nonce . After that, computes and . After that, transmits the message to via .
- Step 2: After receiving the message, retrieves in its database and then obtains , corresponding to in its database. Then, calculates , , , and , and checks . If it matches, authenticates , successfully.
- Step 3: generates a random nonce and timestamp . After that, computes , , , , , , and . selects the new temporary identities, and for and , and then changes , and in its database. Then, calculates and and transmits to over an open channel.
- Step 4: Upon receiving the message, verifies the freshness of . If it matches, calculates , , , , , and , and then checks whether and . If they are valid, authenticates . After that, stores the session keys and and the new temporary identity .
- Step 5: Then, selects and computes , , , and then transmits to .
- Step 6: After eavesdropping on the message, , calculates , , , and . Note that , included in the session key, is the same as . Finally, stores a session key and a new temporary identity .
Consequently, their scheme is not resistant to impersonation attacks since can impersonate the legitimate .
5.2. MITM Attack
Based on the threat model, can extract the secret parameters stored in . Furthermore, can block, intercept, modify, replay, and delete the transmitted messages via an open channel.
- Step 1: After eavesdropping on the message via a public channel, first calculates and . After that, transmits .
- Step 2: After eavesdropping on the message via a public channel, computes and .
- Step 3: calculates a session key , where , included in the session key, is the same as . Finally, successfully calculates and then verifies . Hence, their scheme is not protected against this attack.
5.3. Session Key Disclosure Attack
Based on Section 5.2, extracts and , and then computes a session key successfully. As a result, can successfully obtain a common session key between legitimate and . Thus, Guo et al.’s scheme is insecure to this attack.
5.4. Mutual Authentication
In Guo et al.’s scheme, they claimed to provide mutual authentication between the entities. Unfortunately, according to Section 5.2 and Section 5.3, can successfully generate the sensitive messages, and , for mutual authentication. Thus, Guo et al.’s scheme cannot guarantee secure mutual authentication between the legitimate and .
5.5. Untraceability
Guo et al. claimed that their protocol achieved untraceability. However, according to Section 5.2 and Section 5.3, calculates the random nonces and and then computes a session key . After that, successfully calculates a new temporary identity . Thus, Guo et al.’s scheme does not achieve untraceability because can trace the authorized through their new temporary identity.
6. Proposed Scheme
The existing related schemes for wearable computing are not protected against potential security attacks. Thus, we propose a “robust and efficient authentication and group–proof scheme using the PUF for wearable computing (AGPS-PUF)” to improve the security flaws of the existing schemes. The AGPS-PUF is resilient to cyber/physical security attacks and provides necessary security functionalities. The AGPS-PUF consists of six phases: (1) system setup, (2) registration, (3) login and authentication, (4) group proof, and (5) password update. We show the overall flowchart during the AKA phase of the AGPS-PUF, as shown in Figure 3.
Figure 3.
The overall flowchart during the AKA phase.
6.1. System Setup Phase
In this section, first sets the secret credentials for each . The following are detailed descriptions:
- SP-1:
- selects a master private key for .
- SP-2:
- chooses a unique identity for each and then generates a temporary identity for each .
- SP-3:
- stores in ’s secure database and then stores the secret credentials in the memory of .
6.2. Registration Phase
This phase consists of two parts: and registration phases.
6.2.1. User Registration Phase
In this phase, registers within and then obtains the secret credentials from .
- URP-1:
- chooses unique and in . After that, selects a random number and generates a set of based on the PUF to ensure the unique physical properties of the device. Then, computes and and then transmits to over a secure channel.
- URP-2:
- generates a temporary identity and computes , , , , , Finally, stores in ’s database and then sends to over a secure channel.
- URP-3:
- Finally, computes and stores in its memory.
6.2.2. Wearable Device Registration Phase
In this phase, registers within and then obtains the secret credentials from .
- WDRP 1:
- generates a random number and a set under the PUF to ensure the unique physical properties of the device. After that, calculates and . After that, sends to .
- WDRP 2:
- retrieves the corresponding stored in the database using . After that, computes , and , and verifies . If it is invalid, terminates ’s registration request; otherwise, computes , , , , and . After that, stores in ’s secure database and then transmits to .
- WDRP 3:
- Finally, computes and then stores in memory.
6.3. Login and Authentication Phase
The registered and should establish a common session key with the help of to use reliable medical services. This phase is illustrated in Figure 4.
Figure 4.
Login and Authentication Phase of the AGPS-PUF.
- LAP-1:
- first inputs a unique identity and password into . After that, calculates , , , , and and then checks . If it matches, generates a random nonce and a timestamp . Then, computes to make the masked random nonce and transmits to via an insecure channel.
- LAP-2:
- checks the freshness of , where is the current timestamp and is the maximum transmission delay for the message to be transmitted between and . If it matches, calculates , , and . Then, selects and . After that, chooses a pair of from the preloaded CRPs to ensure the unique physical properties of the device and computes to make the masked random nonce, and to verify the authorized entity, and then transmits to .
- LAP-3:
- After receiving the message, verifies the freshness of . If it matches, generates and a timestamp and chooses a pair of from the preloaded CRPs to ensure the unique physical properties of the device. After that, decrypts to obtain the random nonce and calculates to verify the authorized entity, and then transmits to through a public channel.
- LAP-4:
- After receiving from , checks the freshness of . If it matches, finds on the basis of . After that, extracts corresponding to in its database. decrypts , and computes , and , and verifies . If it matches, aborts the current session; otherwise, extracts to the corresponding in its database. Then, finds on the basis of and computes , , , and , and verifies . If it matches, selects the new temporary identities, and for and , and updates to and to in its database. generates and and computes , , , to transmit the secret parameters securely, and to verify the authorized entity. Finally, sends to .
- LAP-5:
- verifies the freshness of . If it matches, decrypts and computes , and , and verifies . If it is not equal, terminates the current session; otherwise, updates a new temporary identity to and stores the session keys and . After that, generates a timestamp and computes to transmit the secret parameters securely, and to verify the authorized entity, and then transmits to over a public channel.
- LAP-6:
- checks the freshness of . If it matches, computes , , and , and verifies . If it matches, authenticates , successfully and then calculates . Finally, updates a new temporary identity to and stores a session key .
6.4. Group–Proof Generation and Verification Phases
After the authentication process is executed successfully, generates a group proof for multiple by , indicating that belongs to the same and then sends the group proof to for verification. This phase is illustrated in Figure 5.
Figure 5.
Group–proof generation and verification phase of the AGPS-PUF.
- GPGV 1:
- for authorized selects and . After that, computes and then sends to over a public channel.
- GPGV 2:
- verifies the freshness of . If it matches, calculates and generates a random nonce and a timestamp . After that, computes , , and , and then transmits to .
- GPGV 3:
- checks the freshness of . If it matches, computes and , and checks whether . If it matches, generates the group proof for all wearable devices. Finally, encrypts using a session key and then transmits to over an open channel.
- GPGV 4:
- decrypts using a session key . extracts corresponding to in this database, computes , and then extracts and , corresponding to in its database. After that, computes , , , and and then checks whether . If it matches, successfully verifies that the multiple instances of belong to the same through the group proof.
6.5. Password Update Phase
If wishes to obtain a new , can freely update their old without interacting with .
- PUP-1:
- inputs and an old password in .
- PUP-2:
- chooses a set of , and computes , , , , and , and verifies whether . If the condition is met, is prompted to choose a new password.
- PUP-3:
- inputs a new and computes , , , . Finally, replaces with . As a result, contains .
7. Security Analysis
The following introduces the informal/formal security analyses.
7.1. Informal Security Analysis
We demonstrate that the AGPS-PUF can prevent“lethal security attacks” and allow “anonymity, untraceability, and mutual authentication”.
7.1.1. Impersonation Attack
This attack means that attempts to impersonate the legitimate user by eavesdropping on the exchanged data over an open channel. In this case, should generate the authentication messages , and . However, it is difficult to generate the sensitive messages since cannot obtain the “random nonces ” and “secret credential ”. Consequently, the AGPS-PUF is resistant to impersonation attacks because cannot successfully generate the sensitive messages of the legitimate user.
7.1.2. MITM Attack
According to Section 3.1, can inject, modify, eavesdrop, intercept, delete, and block the exchanged messages, , in the bidirectional communication between , , and , and then attempt to obtain sensitive information from legitimate entities. However, cannot generate sensitive messages since all messages are masked with the PUF responses, , and fresh random nonces , by using “XOR” and “hash” functions. Hence, the AGPS-PUF is secure against MITM attacks since cannot obtain sensitive information from legitimate entities.
7.1.3. Session Key Disclosure Attack
Based on the information presented in Section 3.1, can steal the and then extract the secret information stored in the memory. In the AGPS-PUF, should obtain the real identities and random nonces to calculate the session keys, and . However, it is impossible for to obtain the common session keys, and , since the random nonces and real identities are preserved with secret parameters , and the PUF parameters , using cryptographic primitives. Hence, the AGPS-PUF resists session key disclosure attacks.
7.1.4. Replay Attack
eavesdrops on the transmitted messages during the AKA phase and then attempts to authenticate with other parties by transmitting the intercepted data in the previous session. A solution to prevent replay attacks, such as the existing schemes [37,38], is to add random nonces and timestamps to the information exchanged so that the data are unique for each authentication phase. Thus, the AGPS-PUF verifies the freshness of . Moreover, the data are masked with . Therefore, even if selects and sends valid authentication messages to legitimate entities, the AGPS-PUF is secure against replay attacks since the current timestamp freshness is incorrect.
7.1.5. Physical Wearable Device Capture Attack
Assume that s are physically captured by and then extract in ’s memory, where and . However, does not successfully compute between and without the knowledge of and the secret credentials . In addition, the PUF pairs are distinct, independent, and secure for all batched . Hence, the AGPS-PUF is resilient against physical wearable device capture attacks since the PUF output depends on the inherent physical fluctuations of the IC chip.
7.1.6. Stolen Verifier Attack
In this attack, extracts and learns the secret parameters related to and , which are stored in the database of , and it then attempts to masquerade as a legitimate entity. However, even if obtains the stored parameters for and for , cannot calculate the common session keys , and impersonate a legitimate entity. Unfortunately, does not obtain the secret credentials that are masked with ’s master secret key by performing the cryptographic primitives. Furthermore, PUF pairs , and for and are computationally infeasible for to derive the fresh PUF because the PUF output depends on the inherent physical fluctuations of the IC. Hence, the AGPS-PUF is resistant to stolen verifier attacks.
7.1.7. Offline Password-Guessing Attack
Referring to the information presented in Section 3.1, we assume that can intercept the transmitted information and then extract the secret credentials stored in the . Then, attempts to use these attacks to guess ’s real . However, is composed as . Therefore, it is impossible for to correctly guess without knowledge of the random number and the PUF response value . As a result, the offline password-guessing attack is not feasible in the AGPS-PUF.
7.1.8. Desynchronization Attack
In the AGPS-PUF, the temporary identities, and , are assigned to and during the AKA phase and then tables are maintained from . Since both the old temporary identities, i.e., and , are stored, if the last acknowledgment messages are blocked or lost due to time delay, there will always be consistent temporary identities between , , and . Thus, the AGPS-PUF is resistant to desynchronization attacks.
7.1.9. Privileged Insider Attack
In this attack, is a privileged insider of the proposed system. Hence, we assume that is able to obtain the request message from the remote user . However, the secret credentials, of , and , are computationally infeasible for without knowledge of the master private key and identity . Thus, the AGPS-PUF can prevent privileged insider attacks because cannot correctly generate the sensitive information of and .
7.1.10. Mutual Authentication
In the AGPS-PUF, all participants successfully perform secure mutual authentication. After obtaining the authentication request messages, , check whether to verify the authenticity and integrity of the received message. If it matches, is authenticated with . then verifies whether to verify the authenticity and integrity of the received message. If it matches, is authenticated with . Upon receiving the authentication message, , checks to verify the authenticity and integrity of the received message. If it matches, authenticates . After receiving the authentication confirmation message, , verifies to verify the authenticity and integrity of the received message. If it is valid, authenticates . Thus, the AGPS-PUF successfully allows secure mutual authentication and integrity between , , and .
7.1.11. Anonymity and Untraceability
Assume that intercepts the transmitted messages during the AKA phase. However, it is impossible for to obtain ’s identity and pseudo-identity and ’s identity and pseudo-identity without knowledge, such as random nonces, the PUF secret value, and secret credentials. Hence, the AGPS-PUF provides anonymity for and . Furthermore, cannot track the legitimate since all messages are unique and dynamic using timestamps, random nonces, and temporary identities in each session. Moreover, the temporary identities, and of and , are updated as and in each session. Hence, 3P-AGPS guarantees untraceability for and .
7.1.12. Perfect Forward Secrecy (PFS)
The PFS security indicates that will not be exposed to even if a long-term secret key is compromised. In the AGPS-PUF, if ’s long-term secret key is compromised, cannot compute the session keys, and , because does not have knowledge of the secret credentials , the PUF secret value , and real identities . Consequently, the AGPS-PUF is resistant to PFS.
7.2. Formal Analysis through ROR Oracle Model
We utilize a formal proof, denoted as the ROR Oracle model, to prove the session key (SK) security. We define the queries required for the ROR Oracle model [10].
In the AGPS-PUF, there are three participants: the mobile user , the wearable device , and the cloud server . Let be the instance of a participant U, be the instance of a participant , and be the instance of a participant . In Table 2, we present the descriptions for each query, including “,, , , and for ROR Oracle model”.
Table 2.
Query and purpose.
Theorem 1.
Let be the advantage that is able to break the SK security of the AGPS-PUF. Hence, we derive the following
Proof.
The range space, query number, query number, and range space indicate , , , and . Furthermore, the Zipf credentials [39] indicate C, , s, and .
Proof: We present the five games (). We indicate that is the probability of to win . All games are described in detail as follows.
Game:: executes a real attack in AGPS-PUF. Hence, picks a random bit c at the beginning of . We obtain the following Equation (1) as
Game: indicates that executes an “eavesdropping attack, in which the transmitted messages are intercepted between U, , and performing query”. In , carries out “/ queries” to compromise SK. The results of the / queries determine whether obtains and . To compromise SK, requires the random nonces , and PUF values. Therefore, is not able to increase the winning probability of . We can derive Equation (2) as
Game: This game indicates that executes a “real attack” based on “ and ” queries. transmits the modified messages to participants and acts as a legal user so that it is able to guess the outcomes of the “ query”. Moreover, aims to find collisions for the hash oracle and attempts to copy messages that are expected to be authenticated by the entities. Because the random nonce, timestamp, temporary secret, and identity are configured using hash functions in each message, running “ and queries” cannot cause a conflict. We can deduce that the probability of aborting the game is bounded by . It is worth noting that this may happen when processing query; the game is aborted with a probability determined by the birthday paradox [40]. The probability of finding collisions in the hash oracle , as per the square of the birthday paradox, is the probability, and the two games, and , are indistinguishable, unless one of the above rules causes the game to abort. Thus, we can have Equation (3) as
Game: This game is executed in the analogy as presented in . By using the “analogous argument” described in , we can derive Equation (4) as
Game: In this game, attempts to extract in the ’s memory by using the “differential power analysis” with and queries. Note that , , , and . Moreover, can obtain the secret credentials in the ’s memory using physical capture attacks. Note that, and . However, is computationally infeasible for to compromise the of the legitimate over the query without and . Moreover, should guess the parameters from the extracted data because does not have knowledge of the “password”, “biometric”, and “PUF secret”. Moreover, it is computationally impossible to guess the “biometric”, “password”, and “PUF secret”. In conclusion, and are “indistinguishable”. We obtain Equation (5) as follows:
Based on the execution of , attempts to guess the “bit c to win the games by performing query”. We can obtain Equation (6) as follows:
Based on the “triangular inequality with the Formulas (3), (4), (5) and (7)”, we obtain Equation (8) as follows:
Finally, by multiplying both sides of Equation (8) by a factor of 2, we can obtain the following: □
7.3. Formal Analysis through AVISPA Simulation
This simulation proves the formal security robustness of the cryptographic protocol against MITM and replay attacks. We implement the security simulation and demonstrate the security result. We first need to implement the AGPS-PUF as a programming language HLPSL [41]. After that, this simulation starts analyzing the intermediate format (IF) over the four backends: “On-the-Fly Model Checker (OFMC)”, “Constraint Logic-based Attack Searcher (CL-AtSe)”, “SAT-based Model-Checker (SATMC)”, and “Tree Automata based on Automatic Approximations for the Analysis of Security Protocols (TA4SP)”. Since TA4SP and SATMC backends do not implement XOR operations, the simulation results of the AGPS-PUF under these backends become inconclusive; thus, the results based on TA4SP and SATMC backends have been ignored.
We simulated the AGPS-PUF using the “Security Protocol ANimator (SPAN) [10]” for AVISPA. It is worth noting that AVISPA implements the DY model and that an intruder participates in the protocol execution with a concrete session. The specification roles of the , U, and are implemented using HLPSL, such as sessions, security goals, and environments. In Figure 6, the HLPSL specification of the protocol is converted into the IF by using the HLPSL2IF translator. After that, the IF is converted to the output format (OF) by feeding it to one of the four backends. The OF contains the following:
Figure 6.
AVISPA simulation results based on SPAN.
- SUMMARY: It refers to whether the tested security protocol is safe or unsafe, or whether the analysis is inconclusive.
- DETAILS: It explains why the analysis is inconclusive, why the tested security protocol is safe, or under what conditions the test applications or security protocols may be exploitable to the attack.
- PROTOCOL: It refers to the HLPSL specification of the target security protocol in the IF.
- GOAL: It demonstrates the goal of the analysis, which is performed by AVISPA using HLPSL specifications.
- BACKEND: It is the name of the backend that is utilized for the analysis of SATMC, CL-AtSe, OFMC, or TA4SP.
- STATISTICS: It includes the trace of any potential vulnerability in the target security protocol, along with several useful statistics and related comments.
In the simulation based on AVISPA backends, two verifications were performed: (1) checking for replay attacks and (2) DY model-based MITM attacks. When checking for replay attacks on the AGPS-PUF, both OFMC and CL-AtSe check if the legitimate participants can execute the specified protocols by performing a search for a passive intruder. Moreover, both OFMC and CL-AtSe backends are used to check whether any MITM attacks are possible by an intruder in the DY model. The SPAN simulation results demonstrate the security attacks and intruder simulations over a web-based GUI (graphical user interface). Moreover, the implementation results obtained using the CL-AtSe and OFMC backends are presented in Figure 7. According to the simulation results under the OFMC and CL-AtSe in Figure 7, the SAFE output shows that the AGPS-PUF is safe based on the specified security goals. Consequently, we demonstrate that the AGPS-PUF is protected from replay and MITM attacks.
Figure 7.
AVISPA results based on OFMC and CL-AtSe.
8. Testbed Experiments Using MIRACL
We present the testbed experiments to estimate the execution times required for essential cryptographic operations utilized in the AGPS-PUF and existing related schemes. We used the well-known “MIRACL crypto SDK [42]”, which is a C/C++-based programming software library.
We used the two platforms to estimate the execution times required for cryptographic operations. , , , and evaluate the execution times required for “a AES encryption and decryption”, “an ECC scalar point multiplication”, “a modular exponentiation”, and “a SHA-256 hash function”.
- Platform 1: This platform is used to calculate the execution times for the and settings on MIRACL, as follows: “Model: Raspberry PI 4B, with “OS: Ubuntu 20.04.2 LTS”, “Processor: 1.5 GHz Quad-core”, “CPU: 64-bit”. Each operation was run 1000 times on the same setup and we observed the average, maximum, and minimum times. The results of this platform are tabulated in Table 3.
Table 3. Execution times (in milliseconds) based on the MIRACL library, obtained using a Raspberry Pi 4.
- Platform 2: This platform was used to calculate the execution time for the server setting as follows: “OS: Ubuntu 18.04.4 LTS, Processor: Intel Core i5-10400 @2.9 GHz, Six-core, CPU: 64-bits”. All primitives were run 1000 times on the same setup and we observed the average, maximum, and minimum times. The results of this platform are tabulated in Table 4.
Table 4. Execution times (in milliseconds) based on the MIRACL library for a server.
9. Performance Comparison
This section presents the “performance comparison analysis” of the AGPS-PUF and existing related schemes for wearable computing [8,21,23,25,26,28].
9.1. Computation Costs
We discuss the comparative computation costs of the AGPS-PUF with the existing related schemes [8,21,23,25,26,28] during the AKA phase. We used the“ testbed experimental results for the Raspberry PI 4 and server setting in Section 8”. With the information presented in Table 3, we utilized the analysis results of the average time for each operation under and .
We calculated the execution times for the and settings on MIRACL as follows: “Model: Raspberry PI 4B, with “OS: Ubuntu 20.04.2 LTS”, “Processor: 1.5 GHz Quad-core”, “CPU: 64-bit”. As seen in Table 3, we present “ ms, ms, ms and ms”. Moreover, we calculated the execution times for the server setting as follows: “OS: Ubuntu 18.04.4 LTS, Processor: Intel Core i5-10400 @2.9 GHz, Six-core, CPU: 64-bits”. As seen in Table 4, we utilized the analysis results for the average time of each operation under . In scenario 2, we present “ ms, ms, ms and ms”. We prove the performance results for the comparative computational costs in Table 5 and Figure 8. Consequently, the AGPS-PUF offers the necessary security requirements and features while maintaining similar costs compared to previous schemes [8,25,26,28]. Hence, the AGPS-PUF is suitable for practical wearable computing environments.
Table 5.
Comparison between computational costs.
Figure 8.
Computational cost comparison of all entities.
9.2. Communication Costs
We discuss the comparative communication costs of the AGPS-PUF and existing related schemes [8,21,23,25,26,28]. Referring to [8], we assume that the bits for the timestamp, the PUF challenge, identity, random nonce, symmetric encryption/decryption, and hash digest are 32, 64, 128, 128, 128, and 256 bits, respectively. During the AKA phase of the AGPS-PUF, the exchanged messages , , , , and require “(256 + 32 = 288 bits), (256 + 256 + 128 + 64 + 32 = 736 bits), (256 + 256 + 128 + 256 + 128 + 128 + 64 + 64 + 32 + 32 = 1344), (128 + 256 + 32 = 416 bits), and (256 + 256 + 256 + 32 + 32 = 832 bits)”. Consequently, the AGPS-PUF has similar costs compared with previous schemes, as presented in Table 6 and Figure 9, since transmitting fewer bits minimizes the network latency and number of collisions.
Table 6.
Comparison between communication costs.
Figure 9.
Communication cost comparison.
9.3. Security Functionality Comparison
This section compares the “security functionalities” of the AGPS-PUF with the existing related schemes for wearable computing [8,21,23,25,26,28]. In Table 7, we show that some existing schemes for wearable computing are not fully protected and may be fragile to different potential security attacks. Thus, the security protocols must be designed in such a way that they must be robust against lethal security attacks. In contrast, the AGPS-PUF is resilient to lethal security attacks, and guarantees the necessary security requirements and functionalities, including “mutual authentication, PFS, anonymity, and untraceability”. Thus, the AGPS-PUF provides more security functionalities when compared to the existing related schemes for wearable computing [8,21,23,25,26,28].
Table 7.
Comparative study on security features.
10. Conclusions
We prove that Guo et al.’s scheme is not protected against session key disclosure, MITM, and impersonation attacks, and it does not offer security requirements and features such as mutual authentication and untraceability. Hence, we designed an efficient and robust authentication and group–proof scheme using the PUF for wearable computing to address the security issues of Guo et al.’s scheme. We demonstrate the session key security of the AGPS-PUF by performing formal security under the ROR Oracle model analysis and show that the AGPS-PUF is resistant to replay and MITM attacks by using the AVISPA simulation analysis. Furthermore, we present the testbed experiments of the AGPS-PUF using MIRACL crypto SDK based on Raspberry PI 4. We demonstrate the performance comparison of the AGPS-PUF and the existing related schemes for wearable computing with respect to computation costs, communication costs, and security features. Thus, the AGPS-PUF ensured a higher security level than the existing related scheme in wearable computing environments and provided similar computational and communication costs to the existing related schemes for wearable computing. Thus, the AGPS-PUF is suitable for practical wearable computing environments, as it offers more effective efficiency and superior security compared to existing related schemes for wearable computing.
Author Contributions
Conceptualization, S.Y.; methodology, S.Y.; validation, S.Y.; formal analysis, S.Y.; writing—original draft preparation, S.Y.; writing—review and editing, Y.P.; supervision, Y.P.; project administration, Y.P. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP) grant funded by the Korean government (MSIT) (no. 2022-0-01019, Development of eSIM security platform technology for edge devices to expand the eSIM ecosystem).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Roggen, D.; Magnenat, S.; Waibel, M.; Troster, G. Wearable Computing. IEEE Robot. Autom. Mag. 2011, 18, 83–95. [Google Scholar] [CrossRef]
- Sun, H.; Zhang, Z.; Hu, R.Q.; Qian, Y. Wearable Communications in 5G: Challenges and Enabbling Technologies. IEEE Veh. Technol. Mag. 2018, 13, 100–109. [Google Scholar] [CrossRef]
- Abbas, G.; Tanveer, M.; Abbas, Z.H.; Waqas, M.; Baker, T. A Secure Remote User Authentication Scheme for 6LoWPAN-based Internet of Things. PLoS ONE 2021, 16, e0258279. [Google Scholar] [CrossRef] [PubMed]
- Majumder, S.; Mondal, T.; Deen, M.J. Wearable Sensors for Remote Health Monitoring. Sensors 2017, 17, 130. [Google Scholar] [CrossRef] [PubMed]
- Seneviratne, S.; Hu, Y.; Nguyen, T.; Lan, G.; Khalifa, S.; Thilakarathna, K.; Hassan, M.; Seneviratne, A. A Survey of Wearable Devices and Challenges. IEEE Commun. Surv. Tutor. 2017, 19, 2573–2620. [Google Scholar] [CrossRef]
- Wang, S.; Bie, R.; Zhao, F.; Zhang, N.; Cheng, X.; Choi, H.A. Security in Wearable Communications. IEEE Netw. 2016, 30, 61–67. [Google Scholar] [CrossRef]
- Zhang, Y.; Deng, R.H.; Han, G.; Zheng, D. Secure Smart Health with Privacy-aware Aggregate Authentication and Access Control in Internet of Things. J. Netw. Comput. Appl. 2018, 123, 89–100. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, Z.; Guo, Y. Anonymous Authenticated Key Agreement and Group Proof Protocol for Wearable Computing. IEEE Trans. Mob. Comput. 2022, 21, 2718–2731. [Google Scholar] [CrossRef]
- AVISPA. Automated Validation of Internet Security Protocols and Applications. 2001. Available online: http://www.avispa-project.org/ (accessed on 16 March 2021).
- Abdalla, M.; Fouque, P.A.; Pointcheval, D. Password-based authentication key exchange in the three-party setting, in Public Key Cryptography. In Proceedings of the International Workshop on Public Key Cryptography, Les Diablerets, Switzerland, 23–26 January 2005; Springer: Berlin/Heidelberg, Garmany, 2005; pp. 65–84. [Google Scholar]
- Park, K.S.; Noh, S.K.; Lee, H.J.; Das, A.K.; Kim, M.H.; Park, Y.H.; Wazid, M. LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things. IEEE Access 2020, 8, 119387–119404. [Google Scholar] [CrossRef]
- Das, A.K.; Zeadally, S.; Wazid, M. Lightweight Authentication Protocols for Wearable Devices. Comput. Electr. Eng. 2017, 63, 196–208. [Google Scholar] [CrossRef]
- Vhaduri, S.; Poellabauer, C. Multi-Modal Biometric-Based Implicit Authentication of Wearable Device Users. IEEE Trans. Inf. Forensics Secur. 2019, 14, 3116–3125. [Google Scholar] [CrossRef]
- Li, M.; Yu, S.; Lou, W.; Ren, K. Group Device Pairing Based Secure Sensor Association and Key Management for Body Area Networks. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 2651–2659. [Google Scholar]
- Tan, C.C.; Wang, H.; Zhong, S.; Li, Q. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 2019, 13, 926–932. [Google Scholar] [CrossRef]
- Xiong, H.; Qin, Z. Revocable and Scalable Certificateless Remote Authentication Protocol with Anonymity for Wireless Body Area Networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1442–1455. [Google Scholar] [CrossRef]
- Al-Riyami, S.S.; Paterson, K.G. Certificateless Public Key Cryptography. Lect. Notes Comput. Sci. 2003, 294, 452–473. [Google Scholar]
- Liu, W.; Liu, H.; Wan, Y.; Kong, H.; Ning, H. The Yoking-Proof-based Authentication Protocol for Cloud-assisted Wearable Devices. Pers. Ubiquitous Comput. 2016, 20, 469–479. [Google Scholar] [CrossRef]
- Das, A.K.; Wazid, M.; Kumar, N.; Khan, M.K.; Choo, K.K.R.; Park, Y.H. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE J. Biomed. Health Inform. 2018, 22, 1310–1322. [Google Scholar] [CrossRef]
- Liu, H.; Yao, X.; Yang, T.; Ning, H. Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health. IEEE Internet Things J. 2019, 6, 1352–1362. [Google Scholar] [CrossRef]
- Li, X.; Niu, J.; Kumari, S.; Liao, J.; Liang, W.; Khan, M.K. A New Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks with User Anonymity. Secur. Commun. Netw. 2016, 9, 2643–2655. [Google Scholar] [CrossRef]
- Das, A.K.; Sutrala, A.K.; Odelu, V.; Goswami, A. A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks. Wirel. Pers. Commun. 2017, 94, 1899–1933. [Google Scholar] [CrossRef]
- Wu, F.; Xu, L.; Kumari, S.; Li, X. An Improved and Anonymous Two-factor Authentication Protocol for Health-care Applications with Wireless Medical Sensor Networks. Multimed. Syst. 2017, 23, 195–205. [Google Scholar] [CrossRef]
- Srinivas, J.; Mishra, D.; Mukhopadhyay, S. A Mutual Authentication Framework for Wireless Medical Sensor Networks. J. Med. Syst. 2017, 41, 80. [Google Scholar] [CrossRef] [PubMed]
- Amin, R.; Islam, S.K.H.; Biswas, G.P.; Khan, M.K.; Kumar, N. A Robust and Anonymous Patient Monitoring System Using Wireless Medical Sensor Networks. Future Gener. Comput. Syst. 2018, 80, 483–495. [Google Scholar] [CrossRef]
- Ali, R.; Pal, A.K.; Kumari, S.; Sangaiah, A.K.; Li, X.; Wu, F. An Enhanced Three Factor Based Authentication Protocol Using Wireless Medical Sensor Networks for Healthcare Monitoring. J. Ambient. Intell. Humaniz. Comput. 2018, 9, 1–22. [Google Scholar] [CrossRef]
- Gupta, A.; Tripathi, M.; Shaikh, T.J.; Sharma, A. A Lightweight Anonymous User Authentication and Key Establishment Scheme for Wearable Devices. Comput. Netw. 2019, 149, 29–42. [Google Scholar] [CrossRef]
- Hajian, R.; ZakeriKia, S.; Erfani, S.H.; Mirabi, M. SHAPARAK: Scalable Healthcare Authentication Protocol with Attack-resilience and Anonymous Key-agreement. Comput. Netw. 2020, 183, 107567. [Google Scholar] [CrossRef]
- Yu, S.J.; Park, K.S. SLAS-TMIS: Secure, Anonymous and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments. IEEE Access 2022, 10, 60534–60549. [Google Scholar] [CrossRef]
- Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
- Yu, S.J.; Park, K.S. ISG-SLAS: Secure and Lightweight Authentication and Key Agreement Scheme for Industrial Smart Grid Using Fuzzy Extractor. J. Syst. Archit. 2022, 131, 102698. [Google Scholar] [CrossRef]
- Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 1999; pp. 388–397. [Google Scholar]
- Park, K.S.; Park, Y.H.; Park, Y.H.; Das, A.K. 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment. IEEE Access 2018, 6, 30225–30241. [Google Scholar] [CrossRef]
- Yu, S.J.; Park, Y.H. A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions. IEEE Internet Things J. 2022, 9, 20214–20228. [Google Scholar] [CrossRef]
- Gao, Y.; Sarawi, S.F.A.; Abbott, D. Physical Unclonable Functions. Nat. Electron. 2020, 3, 81–91. [Google Scholar] [CrossRef]
- Frikken, K.B.; Blanton, M.; Atallah, M.J. Robust Authentication Using Physically Unclonable Functions. In Proceedings of the International Conference on Information Security, Pisa, Italy, 7–9 September 2009; pp. 262–277. [Google Scholar]
- Badshah, A.; Waqas, M.; Abbas, G.; Muhammad, F.; Abbas, Z.H.; Vimal, S.; Bilal, M. LAKA-BSG: Lightweight Authenticated Key Exchange Scheme for Blockchain-Enabled Smart Grids. Sustain. Energy Technol. Assessments 2022, 52, 102248. [Google Scholar] [CrossRef]
- Tanveer, M.; Alasmary, H. LACP-SG: Lightweight Authentication Protocol for Smart Grids. Sensors 2023, 23, 2309. [Google Scholar] [CrossRef] [PubMed]
- Wang, D.; Cheng, H.; Wang, P.; Huang, X.; Jian, G. Zipf’s Law in Passwords. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2776–2791. [Google Scholar] [CrossRef]
- Boyko, V.; Mackenzie, P.; Patel, S. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; Springer: Berlin/Heidelberg, Germany, 2000; pp. 156–171. [Google Scholar]
- Oheimb, D.V. The High-Level Protocol Specification Lanuage HLPSL Developed in the EU Project AVISPA. In Proceedings of the APPSEM 2005 Workshop, Tallinn, Finland, 13 September 2005; pp. 1–17. [Google Scholar]
- MIRACL. Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library. 2019. Available online: https://github.com/miracl/MIRACL (accessed on 16 April 2021).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).








