Improved two factor fuzzy commitment scheme for securing IoT device
PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve thi...
Gespeichert in:
Veröffentlicht in: | International Journal of Pervasive Computing and Communications 2023-02, Vol.19 (2), p.255-266 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 266 |
---|---|
container_issue | 2 |
container_start_page | 255 |
container_title | International Journal of Pervasive Computing and Communications |
container_volume | 19 |
creator | Yuvarani, T Arunachalam, A R |
description | PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%. |
doi_str_mv | 10.1108/IJPCC-01-2021-0009 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2779705990</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2779705990</sourcerecordid><originalsourceid>FETCH-LOGICAL-c268t-edb44204d3add6673dd94f2f743cb95ec77cc5327d1b143e015fe5808b9e995b3</originalsourceid><addsrcrecordid>eNpNkEtPwzAQhC0EEqXwBzhZ4mxYPxLHRxTxCEKCQzlbib2GVKQpdlLU_npSyoHTjDSj2dVHyCWHa86huKmeXsuSAWcCBGcAYI7IjGslmJaaH__zp-QspSVAXkhezEhZdevYb9DT4bunoXZDH2kYd7stdX3XtUOHq4Em94Ed0jBlCd0Y29U7rfoF9bhpHZ6Tk1B_Jrz40zl5u79blI_s-eWhKm-fmRN5MTD0jVIClJe193mupfdGBRG0kq4xGTqtncuk0J43XEkEngXMCigag8ZkjZyTq8Pu9PHXiGmwy36Mq-mkFVobDZkxMLXEoeVin1LEYNex7eq4tRzsHpb9hWWB2z0su4clfwCeV1zm</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2779705990</pqid></control><display><type>article</type><title>Improved two factor fuzzy commitment scheme for securing IoT device</title><source>Standard: Emerald eJournal Premier Collection</source><creator>Yuvarani, T ; Arunachalam, A R</creator><creatorcontrib>Yuvarani, T ; Arunachalam, A R</creatorcontrib><description>PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.</description><identifier>ISSN: 1742-7371</identifier><identifier>EISSN: 1742-7371</identifier><identifier>EISSN: 1742-738X</identifier><identifier>DOI: 10.1108/IJPCC-01-2021-0009</identifier><language>eng</language><publisher>Bingley: Emerald Group Publishing Limited</publisher><subject>Authentication protocols ; Biometrics ; Cryptography ; Data transmission ; Devices ; Energy consumption ; Internet of Things ; Intrusion ; Security systems ; Statelessness ; Static random access memory ; Theft</subject><ispartof>International Journal of Pervasive Computing and Communications, 2023-02, Vol.19 (2), p.255-266</ispartof><rights>Emerald Publishing Limited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c268t-edb44204d3add6673dd94f2f743cb95ec77cc5327d1b143e015fe5808b9e995b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,21674,27901,27902</link.rule.ids></links><search><creatorcontrib>Yuvarani, T</creatorcontrib><creatorcontrib>Arunachalam, A R</creatorcontrib><title>Improved two factor fuzzy commitment scheme for securing IoT device</title><title>International Journal of Pervasive Computing and Communications</title><description>PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.</description><subject>Authentication protocols</subject><subject>Biometrics</subject><subject>Cryptography</subject><subject>Data transmission</subject><subject>Devices</subject><subject>Energy consumption</subject><subject>Internet of Things</subject><subject>Intrusion</subject><subject>Security systems</subject><subject>Statelessness</subject><subject>Static random access memory</subject><subject>Theft</subject><issn>1742-7371</issn><issn>1742-7371</issn><issn>1742-738X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkEtPwzAQhC0EEqXwBzhZ4mxYPxLHRxTxCEKCQzlbib2GVKQpdlLU_npSyoHTjDSj2dVHyCWHa86huKmeXsuSAWcCBGcAYI7IjGslmJaaH__zp-QspSVAXkhezEhZdevYb9DT4bunoXZDH2kYd7stdX3XtUOHq4Em94Ed0jBlCd0Y29U7rfoF9bhpHZ6Tk1B_Jrz40zl5u79blI_s-eWhKm-fmRN5MTD0jVIClJe193mupfdGBRG0kq4xGTqtncuk0J43XEkEngXMCigag8ZkjZyTq8Pu9PHXiGmwy36Mq-mkFVobDZkxMLXEoeVin1LEYNex7eq4tRzsHpb9hWWB2z0su4clfwCeV1zm</recordid><startdate>20230228</startdate><enddate>20230228</enddate><creator>Yuvarani, T</creator><creator>Arunachalam, A R</creator><general>Emerald Group Publishing Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20230228</creationdate><title>Improved two factor fuzzy commitment scheme for securing IoT device</title><author>Yuvarani, T ; Arunachalam, A R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c268t-edb44204d3add6673dd94f2f743cb95ec77cc5327d1b143e015fe5808b9e995b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication protocols</topic><topic>Biometrics</topic><topic>Cryptography</topic><topic>Data transmission</topic><topic>Devices</topic><topic>Energy consumption</topic><topic>Internet of Things</topic><topic>Intrusion</topic><topic>Security systems</topic><topic>Statelessness</topic><topic>Static random access memory</topic><topic>Theft</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yuvarani, T</creatorcontrib><creatorcontrib>Arunachalam, A R</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International Journal of Pervasive Computing and Communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yuvarani, T</au><au>Arunachalam, A R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Improved two factor fuzzy commitment scheme for securing IoT device</atitle><jtitle>International Journal of Pervasive Computing and Communications</jtitle><date>2023-02-28</date><risdate>2023</risdate><volume>19</volume><issue>2</issue><spage>255</spage><epage>266</epage><pages>255-266</pages><issn>1742-7371</issn><eissn>1742-7371</eissn><eissn>1742-738X</eissn><abstract>PurposeGenerally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.Design/methodology/approachThis paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.FindingsMoreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).Originality/valueThus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.</abstract><cop>Bingley</cop><pub>Emerald Group Publishing Limited</pub><doi>10.1108/IJPCC-01-2021-0009</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1742-7371 |
ispartof | International Journal of Pervasive Computing and Communications, 2023-02, Vol.19 (2), p.255-266 |
issn | 1742-7371 1742-7371 1742-738X |
language | eng |
recordid | cdi_proquest_journals_2779705990 |
source | Standard: Emerald eJournal Premier Collection |
subjects | Authentication protocols Biometrics Cryptography Data transmission Devices Energy consumption Internet of Things Intrusion Security systems Statelessness Static random access memory Theft |
title | Improved two factor fuzzy commitment scheme for securing IoT device |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T02%3A39%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Improved%20two%20factor%20fuzzy%20commitment%20scheme%20for%20securing%20IoT%20device&rft.jtitle=International%20Journal%20of%20Pervasive%20Computing%20and%20Communications&rft.au=Yuvarani,%20T&rft.date=2023-02-28&rft.volume=19&rft.issue=2&rft.spage=255&rft.epage=266&rft.pages=255-266&rft.issn=1742-7371&rft.eissn=1742-7371&rft_id=info:doi/10.1108/IJPCC-01-2021-0009&rft_dat=%3Cproquest_cross%3E2779705990%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2779705990&rft_id=info:pmid/&rfr_iscdi=true |