Next Article in Journal
A Method to Evaluate the Maturity Level of Robotization of Production Processes in the Context of Digital Transformation—Polish Case Study
Previous Article in Journal
Numerical Analysis of Tooth Contact and Wear Characteristics of Internal Cylindrical Gears with Curved Meshing Line
Previous Article in Special Issue
Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks

Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou 311121, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(13), 5400; https://doi.org/10.3390/app14135400
Submission received: 17 May 2024 / Revised: 16 June 2024 / Accepted: 18 June 2024 / Published: 21 June 2024

Abstract

A secure and effective authentication and communication scheme between users and underwater sensors plays an important role in improving the detection and utilization of marine resources in underwater acoustic networks (UANs). However, due to the energy limitations and susceptibility to capture of underwater sensors and gateways, it is necessary to design a lightweight authentication protocol that can resist capture of sensors and gateways during attacks. In this paper, a lightweight authentication protocol for UANs based on the Physical Unclonable Function (PUF) and chaotic map is proposed. We used the advantages of PUF to resist sensors and gateways being captured in attacks and the chaotic map to achieve lightweight authentication because the computational cost of the chaotic map is almost one-third that of Elliptic Curve Cryptography (ECC). Additionally, we used the formal security proof in the random oracle model to prove the security of the proposed scheme. Our scheme was more secure and efficient compared with some other related schemes in terms of security and performance requirements, and the proposed scheme is suitable for UANs.
Keywords: underwater acoustic networks; authentication; protocol; chaotic maps; PUF underwater acoustic networks; authentication; protocol; chaotic maps; PUF

Share and Cite

MDPI and ACS Style

Xie, Q.; Yao, Y. PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks. Appl. Sci. 2024, 14, 5400. https://doi.org/10.3390/app14135400

AMA Style

Xie Q, Yao Y. PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks. Applied Sciences. 2024; 14(13):5400. https://doi.org/10.3390/app14135400

Chicago/Turabian Style

Xie, Qi, and Ye Yao. 2024. "PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks" Applied Sciences 14, no. 13: 5400. https://doi.org/10.3390/app14135400

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop