Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Syiah Kuala
2021-06-01
|
Series: | Jurnal Rekayasa Elektrika |
Subjects: | |
Online Access: | http://jurnal.unsyiah.ac.id/JRE/article/view/20428 |
id |
doaj-0fda2e02ce3e47d9b814dabed08a5514 |
---|---|
record_format |
Article |
spelling |
doaj-0fda2e02ce3e47d9b814dabed08a55142021-07-16T03:04:23ZengUniversitas Syiah KualaJurnal Rekayasa Elektrika1412-47852252-620X2021-06-0117210.17529/jre.v17i2.2042812893Secure MQTT PUF-Based Key Exchange Protocol for Smart HealthcareRizka Reza Pahlevi0Parman Sukarno1Bayu Erfianto2Telkom UniversityTelkom UniversityTelkom UniversityReplay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.http://jurnal.unsyiah.ac.id/JRE/article/view/20428information securitysmart healthcare devicepuftamarin proverauthentication |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Rizka Reza Pahlevi Parman Sukarno Bayu Erfianto |
spellingShingle |
Rizka Reza Pahlevi Parman Sukarno Bayu Erfianto Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Jurnal Rekayasa Elektrika information security smart healthcare device puf tamarin prover authentication |
author_facet |
Rizka Reza Pahlevi Parman Sukarno Bayu Erfianto |
author_sort |
Rizka Reza Pahlevi |
title |
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare |
title_short |
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare |
title_full |
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare |
title_fullStr |
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare |
title_full_unstemmed |
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare |
title_sort |
secure mqtt puf-based key exchange protocol for smart healthcare |
publisher |
Universitas Syiah Kuala |
series |
Jurnal Rekayasa Elektrika |
issn |
1412-4785 2252-620X |
publishDate |
2021-06-01 |
description |
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks. |
topic |
information security smart healthcare device puf tamarin prover authentication |
url |
http://jurnal.unsyiah.ac.id/JRE/article/view/20428 |
work_keys_str_mv |
AT rizkarezapahlevi securemqttpufbasedkeyexchangeprotocolforsmarthealthcare AT parmansukarno securemqttpufbasedkeyexchangeprotocolforsmarthealthcare AT bayuerfianto securemqttpufbasedkeyexchangeprotocolforsmarthealthcare |
_version_ |
1721297927349993472 |