To read this content please select one of the options below:

Improved two factor fuzzy commitment scheme for securing IoT device

Yuvarani T. (Department of Computer Science and Engineering, Dr. M.G.R. Educational and Research Institute, Chennai, India)
Arunachalam A.R. (Department of Computer Science and Engineering, Dr. M.G.R. Educational and Research Institute, Chennai, India)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 31 July 2021

Issue publication date: 28 February 2023

52

Abstract

Purpose

Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft.

Design/methodology/approach

This paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest.

Findings

Moreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR).

Originality/value

Thus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.

Keywords

Citation

T., Y. and A.R., A. (2023), "Improved two factor fuzzy commitment scheme for securing IoT device", International Journal of Pervasive Computing and Communications, Vol. 19 No. 2, pp. 255-266. https://doi.org/10.1108/IJPCC-01-2021-0009

Publisher

:

Emerald Publishing Limited

Copyright © 2021, Emerald Publishing Limited

Related articles