A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol


Creative Commons License

Mitev M., Shakiba-Herfeh M., Chorti A., Reed M., Baghaee S.

IEEE Access, cilt.10, ss.74555-74571, 2022 (SCI-Expanded) identifier identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 10
  • Basım Tarihi: 2022
  • Doi Numarası: 10.1109/access.2022.3187967
  • Dergi Adı: IEEE Access
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Sayfa Sayıları: ss.74555-74571
  • Anahtar Kelimeler: Authentication, Protocols, Security, Fading channels, Estimation, Entropy, Multi-factor authentication, Physical layer security, multi-factor authentication, PUF, Kalman filter, SKG, 0-RTT, FUZZY EXTRACTOR, LIGHTWEIGHT, SECURITY, VERIFICATION, GENERATION, INTERNET, SYSTEMS, IOT
  • Orta Doğu Teknik Üniversitesi Adresli: Evet

Özet

© 2013 IEEE.Lightweight physical layer security schemes that have recently attracted a lot of attention include physical unclonable functions (PUFs), RF fingerprinting / proximity based authentication and secret key generation (SKG) from wireless fading coefficients. In this paper, we propose a fast, privacy-preserving, zero-round-trip-time (0-RTT), multi-factor authentication protocol, that for the first time brings all these elements together, i.e., PUFs, proximity estimation and SKG. We use Kalman filters to extract proximity estimates from real measurements of received signal strength (RSS) in an indoor environment to provide soft fingerprints for node authentication. By leveraging node mobility, a multitude of such fingerprints are extracted to provide resistance to impersonation type of attacks e.g., a false base station. Upon removal of the proximity fingerprints, the residual measurements are then used as an entropy source for the distillation of symmetric keys and subsequently used as resumption secrets in a 0-RTT fast authentication protocol. Both schemes are incorporated in a challenge-response PUF-based mutual authentication protocol, shown to be secure through formal proofs using Burrows, Abadi, and Needham (BAN) and Mao and Boyd (MB) logic, as well as the Tamarin-prover. Our protocol showcases that in future networks purely physical layer security solutions are tangible and can provide an alternative to public key infrastructure in specific scenarios.