TY - GEN
T1 - HPMAP
T2 - 2018 IEEE International Conference on Communications, ICC 2018
AU - Afifi, M. H.
AU - Zhou, Liang
AU - Chakrabartty, Shantanu
AU - Ren, Jian
N1 - Funding Information:
This work was supported in part by research grants from the National Science Foundation (CNS:1525476, ECCS:1550096) and by research contracts from Semiconductor Research Corporation (Contract 2015-TS-2639 and Contract 2015-TS-2640).
Publisher Copyright:
© 2018 IEEE.
PY - 2018/7/27
Y1 - 2018/7/27
N2 - The proliferation of passive Internet-of-Things (IoT) into the consumer and the enterprise market has necessitated enhanced security requirements. Many security protocols have been proposed in literature to address these requirements, however, they are either prone to certain types of attacks or are computationally expensive for resource- constrained passive IoT devices. In this paper we propose two variants of a novel mutual authentication protocol that utilizes the synchronization property of Fowler Nordheim (FN) tunneling based self-powered timers. The first protocol provides mutual authentication using the dynamic timer values. The protocol is both lightweight and provably immune to most of the well-known security attacks. Moreover, it offers an efficient and secure capability for easy revocation of tags and readers from the IoT system. The second protocol, an enhanced version of the first, provides disguised identities for applications that require privacy preserving. This protocol can thus serve as a perfect candidate for high-security passive IoT applications such as e- passports.
AB - The proliferation of passive Internet-of-Things (IoT) into the consumer and the enterprise market has necessitated enhanced security requirements. Many security protocols have been proposed in literature to address these requirements, however, they are either prone to certain types of attacks or are computationally expensive for resource- constrained passive IoT devices. In this paper we propose two variants of a novel mutual authentication protocol that utilizes the synchronization property of Fowler Nordheim (FN) tunneling based self-powered timers. The first protocol provides mutual authentication using the dynamic timer values. The protocol is both lightweight and provably immune to most of the well-known security attacks. Moreover, it offers an efficient and secure capability for easy revocation of tags and readers from the IoT system. The second protocol, an enhanced version of the first, provides disguised identities for applications that require privacy preserving. This protocol can thus serve as a perfect candidate for high-security passive IoT applications such as e- passports.
KW - Dynamic authentication
KW - FN tunneling
KW - Internet of Things
KW - Low-cost and passive tags
KW - Mutual authentication
UR - http://www.scopus.com/inward/record.url?scp=85051424473&partnerID=8YFLogxK
U2 - 10.1109/ICC.2018.8423016
DO - 10.1109/ICC.2018.8423016
M3 - Conference contribution
AN - SCOPUS:85051424473
SN - 9781538631805
T3 - IEEE International Conference on Communications
BT - 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 20 May 2018 through 24 May 2018
ER -