Improved two factor fuzzy commitment scheme for securing IoT device

PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve thi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Journal of Pervasive Computing and Communications 2023-02, Vol.19 (2), p.255-266
Hauptverfasser: Yuvarani, T, Arunachalam, A R
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 266
container_issue 2
container_start_page 255
container_title International Journal of Pervasive Computing and Communications
container_volume 19
creator Yuvarani, T
Arunachalam, A R
description PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.
doi_str_mv 10.1108/IJPCC-01-2021-0009
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2779705990</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2779705990</sourcerecordid><originalsourceid>FETCH-LOGICAL-c268t-edb44204d3add6673dd94f2f743cb95ec77cc5327d1b143e015fe5808b9e995b3</originalsourceid><addsrcrecordid>eNpNkEtPwzAQhC0EEqXwBzhZ4mxYPxLHRxTxCEKCQzlbib2GVKQpdlLU_npSyoHTjDSj2dVHyCWHa86huKmeXsuSAWcCBGcAYI7IjGslmJaaH__zp-QspSVAXkhezEhZdevYb9DT4bunoXZDH2kYd7stdX3XtUOHq4Em94Ed0jBlCd0Y29U7rfoF9bhpHZ6Tk1B_Jrz40zl5u79blI_s-eWhKm-fmRN5MTD0jVIClJe193mupfdGBRG0kq4xGTqtncuk0J43XEkEngXMCigag8ZkjZyTq8Pu9PHXiGmwy36Mq-mkFVobDZkxMLXEoeVin1LEYNex7eq4tRzsHpb9hWWB2z0su4clfwCeV1zm</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2779705990</pqid></control><display><type>article</type><title>Improved two factor fuzzy commitment scheme for securing IoT device</title><source>Standard: Emerald eJournal Premier Collection</source><creator>Yuvarani, T ; Arunachalam, A R</creator><creatorcontrib>Yuvarani, T ; Arunachalam, A R</creatorcontrib><description>PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.</description><identifier>ISSN: 1742-7371</identifier><identifier>EISSN: 1742-7371</identifier><identifier>EISSN: 1742-738X</identifier><identifier>DOI: 10.1108/IJPCC-01-2021-0009</identifier><language>eng</language><publisher>Bingley: Emerald Group Publishing Limited</publisher><subject>Authentication protocols ; Biometrics ; Cryptography ; Data transmission ; Devices ; Energy consumption ; Internet of Things ; Intrusion ; Security systems ; Statelessness ; Static random access memory ; Theft</subject><ispartof>International Journal of Pervasive Computing and Communications, 2023-02, Vol.19 (2), p.255-266</ispartof><rights>Emerald Publishing Limited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c268t-edb44204d3add6673dd94f2f743cb95ec77cc5327d1b143e015fe5808b9e995b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,21674,27901,27902</link.rule.ids></links><search><creatorcontrib>Yuvarani, T</creatorcontrib><creatorcontrib>Arunachalam, A R</creatorcontrib><title>Improved two factor fuzzy commitment scheme for securing IoT device</title><title>International Journal of Pervasive Computing and Communications</title><description>PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.</description><subject>Authentication protocols</subject><subject>Biometrics</subject><subject>Cryptography</subject><subject>Data transmission</subject><subject>Devices</subject><subject>Energy consumption</subject><subject>Internet of Things</subject><subject>Intrusion</subject><subject>Security systems</subject><subject>Statelessness</subject><subject>Static random access memory</subject><subject>Theft</subject><issn>1742-7371</issn><issn>1742-7371</issn><issn>1742-738X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkEtPwzAQhC0EEqXwBzhZ4mxYPxLHRxTxCEKCQzlbib2GVKQpdlLU_npSyoHTjDSj2dVHyCWHa86huKmeXsuSAWcCBGcAYI7IjGslmJaaH__zp-QspSVAXkhezEhZdevYb9DT4bunoXZDH2kYd7stdX3XtUOHq4Em94Ed0jBlCd0Y29U7rfoF9bhpHZ6Tk1B_Jrz40zl5u79blI_s-eWhKm-fmRN5MTD0jVIClJe193mupfdGBRG0kq4xGTqtncuk0J43XEkEngXMCigag8ZkjZyTq8Pu9PHXiGmwy36Mq-mkFVobDZkxMLXEoeVin1LEYNex7eq4tRzsHpb9hWWB2z0su4clfwCeV1zm</recordid><startdate>20230228</startdate><enddate>20230228</enddate><creator>Yuvarani, T</creator><creator>Arunachalam, A R</creator><general>Emerald Group Publishing Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20230228</creationdate><title>Improved two factor fuzzy commitment scheme for securing IoT device</title><author>Yuvarani, T ; Arunachalam, A R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c268t-edb44204d3add6673dd94f2f743cb95ec77cc5327d1b143e015fe5808b9e995b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication protocols</topic><topic>Biometrics</topic><topic>Cryptography</topic><topic>Data transmission</topic><topic>Devices</topic><topic>Energy consumption</topic><topic>Internet of Things</topic><topic>Intrusion</topic><topic>Security systems</topic><topic>Statelessness</topic><topic>Static random access memory</topic><topic>Theft</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yuvarani, T</creatorcontrib><creatorcontrib>Arunachalam, A R</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International Journal of Pervasive Computing and Communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yuvarani, T</au><au>Arunachalam, A R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved two factor fuzzy commitment scheme for securing IoT device</atitle><jtitle>International Journal of Pervasive Computing and Communications</jtitle><date>2023-02-28</date><risdate>2023</risdate><volume>19</volume><issue>2</issue><spage>255</spage><epage>266</epage><pages>255-266</pages><issn>1742-7371</issn><eissn>1742-7371</eissn><eissn>1742-738X</eissn><abstract>PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.</abstract><cop>Bingley</cop><pub>Emerald Group Publishing Limited</pub><doi>10.1108/IJPCC-01-2021-0009</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1742-7371
ispartof International Journal of Pervasive Computing and Communications, 2023-02, Vol.19 (2), p.255-266
issn 1742-7371
1742-7371
1742-738X
language eng
recordid cdi_proquest_journals_2779705990
source Standard: Emerald eJournal Premier Collection
subjects Authentication protocols
Biometrics
Cryptography
Data transmission
Devices
Energy consumption
Internet of Things
Intrusion
Security systems
Statelessness
Static random access memory
Theft
title Improved two factor fuzzy commitment scheme for securing IoT device
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T02%3A39%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20two%20factor%20fuzzy%20commitment%20scheme%20for%20securing%20IoT%20device&rft.jtitle=International%20Journal%20of%20Pervasive%20Computing%20and%20Communications&rft.au=Yuvarani,%20T&rft.date=2023-02-28&rft.volume=19&rft.issue=2&rft.spage=255&rft.epage=266&rft.pages=255-266&rft.issn=1742-7371&rft.eissn=1742-7371&rft_id=info:doi/10.1108/IJPCC-01-2021-0009&rft_dat=%3Cproquest_cross%3E2779705990%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2779705990&rft_id=info:pmid/&rfr_iscdi=true