1. Introduction
The IIoT stands as a pivotal element within the broader Internet of Things (IoT) ecosystem, significantly enhancing the sophistication of contemporary industrial intelligence and propelling the evolution of smart manufacturing. The IIoT is distinguished by its attributes of real-time functionality, automation, embedded software, robust security measures, and seamless information interoperability. These features are actively propelling the fourth industrial revolution, ushering in transformative changes across a spectrum of sectors, including but not limited to energy, manufacturing, urban planning, healthcare, and transportation [
1].
As the convergence of industrial automation and information technology accelerates, the scope of IIoT applications is continually expanding. With this expansion comes an escalating imperative for security, encompassing protocol security, equipment security, data protection, connection integrity, and management control. Among these, protocol security emerges as the paramount concern within IIoT network security, underpinning the entire network’s defense architecture [
2]. The swift adoption of contemporary IIoT devices has amplified the necessity for resilient security protocols. Implementing stringent security and privacy measures at the protocol level could substantially fortify the IIoT application ecosystem. Given that the majority of IIoT devices are resource-limited, traditional security protocols are often ill-suited to their needs. Hence, there is an urgent need to devise security protocols that are specifically calibrated to the constraints and requirements of this context [
3].
Within the IIoT landscape, the Machine-to-Machine (M2M) environment plays an indispensable role, enabling seamless data interchange and automated control mechanisms between machines through advanced communication technologies. This facilitates an unobstructed device-to-device dialogue within the IIoT framework, thereby enhancing operational efficiency and fostering innovation in industrial processes.
Therefore, the M2M environment requires a reliable and efficient communication path to ensure real-time, accurate, and secure data transmission. This is crucial not only for data integrity and device interoperability but also for operational efficiency, security, and cost-effectiveness. When building and managing an M2M environment, efficient, reliable, and secure communication protocols such as Message Queuing Telemetry Transport (MQTT) and Extensible Messaging and Presence Protocol (XMPP) are typically chosen to facilitate device communication [
4]. MQTT, a lightweight open messaging protocol, is specifically designed for resource-constrained network clients, particularly in low-bandwidth environments [
5]. It provides reliable communication paths for M2M environments, enhances system scalability, and reduces long-distance transmission delays and bandwidth usage. To achieve a more efficient and flexible communication mode in resource-constrained environments, the MQTT for Sensor Networks (MQTT-SN) protocol, which is even lighter than MQTT, has been proposed. The MQTT-SN protocol is an M2M communication protocol designed specifically for the constrained environments of sensor networks [
6].
However, the MQTT-SN protocol does not account for security, and most networks utilizing it still rely on plaintext transmission. Additionally, while standard security protocols like Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) exist, they are not designed for the constrained environments of IIoT and are unsuitable for restricted networks due to their high overhead [
7]. Therefore, many scholars have introduced security mechanisms based on the MQTT-SN protocol and are working to design new protocols to ensure security.
In recent years, PUF hardware has gained significant attention for its uniqueness, unidirectionality, unpredictability, and resistance to cloning. PUF is an encryption technology that offers hardware-level security, based on the principle of utilizing the chip’s physical characteristics to generate a unique identity or key for security operations like authentication, encryption, and decryption [
1]. SRAM PUF, a specific implementation of PUF based on SRAM memory, leverages the deep submicron variations that naturally occur during semiconductor production to impart each transistor with a slight random electrical characteristic, thereby generating a unique and unclonable encryption root key for the device. SRAM PUF is reliable, scalable, and easily implemented, and it can be adapted to various process nodes used in IoT devices [
8]. It is the only known PUF type that can be implemented simply by loading software onto a chip. In constrained environments, such as resource-limited IoT devices, SRAM PUF offers a secure and efficient method for key generation and management. As the keys are randomly extracted from within the chip, no additional hardware or memory is needed, reducing both cost and complexity. Additionally, the SRAM PUF key is generated dynamically, only when needed, and is not permanently stored in the device, further enhancing security [
9].
Given this background, the integration of PUF into the security protocols of IoT devices presents a promising avenue for research and development. This paper delves into this domain, offering a novel perspective on enhancing the security of IoT communications. The main contributions of this paper are as follows.
This paper presents a lightweight security protocol based on MQTT-SN, utilizing lightweight PUF, XOR, hash functions, and other operations.
The paper employs the ProVerif tool (It is hereafter abbreviated as ProVerif), a formal verification tool grounded in the Dolev-Yao attacker model, to rigorously validate the proposed scheme, thereby substantiating its robust security profile.
The proposed scheme is designed with a strong emphasis on ensuring anonymity and untraceability, while also striving for scalability and resilience against DOS attacks, culminating in a high degree of usability.
A comparative analysis reveals that, when juxtaposed with similar schemes, the proposed scheme delivers optimal security at a reasonable cost.
The scheme’s comprehensive fail-stop property marks a significant advancement in proactive attack detection. In the event of an attack against the protocol within the network, the system is equipped to swiftly identify the intrusion and consequently dispatch an immediate alarm to the upper management system, enabling the implementation of subsequent defensive strategies.
The structure of this paper is as follows:
Section 2 offers a comprehensive review of the most pertinent literature to date.
Section 3 lays down the foundational preliminaries essential for understanding the project design.
Section 4 presents a meticulous exposition of the proposed scheme.
Section 5 delves into both formal and informal security analyses of the scheme.
Section 6 juxtaposes the proposed scheme with related work, examining its security and cost implications. Concluding the paper,
Section 7 provides a thorough summary of the findings and contributions.
2. Related Work
In the domain of IIoT M2M security protocols, a critical examination of recent proposals has revealed persistent challenges. While cryptographic techniques like Diffie–Hellman, elliptic curves, and bilinear pairings are utilized, they often struggle to reconcile the competing demands of protocol accessibility and robust security. Achieving a balanced approach is essential for enhancing M2M communication security within the IIoT landscape.
Yu et al. [
10] proposed a data encryption transmission algorithm, MQTT Encryption Algorithms (MQTT-EA), based on MQTT, which requires no additional hardware support, is simple to implement, and is cost-effective. Zheng et al. [
11] proposed a new lightweight mutual authentication and key exchange protocol based on PUF for peer-to-peer (P2P) IoT applications. Chao et al. [
12] proposed the MQTT-SE data encryption transmission algorithm, which includes a bidirectional authentication scheme based on symmetric encryption, public key, and public key certificates. Although these schemes offer security improvements, they may suffer from performance drawbacks and increase computing and communication overhead.
Wang et al. [
13] proposed a PUF-based RFID security authentication protocol to guard against physical cloning. The protocol ensures communication security using two cryptographic primitives, PUF and hash functions, with all communications encrypted to guarantee information privacy and security. He et al. [
14] proposed a lightweight two-party authentication and session key (SK) exchange protocol, which performs security authentication and establishes a shared SKbetween a PUF-enabled cryptosystem and a server. Xu et al. [
15] combined hash functions and PUF to design a MAC algorithm, but this algorithm has high storage and communication overhead, making it less suitable for resource-limited IoT devices.
Wang et al. [
16] proposed an efficient anonymous identity authentication protocol for lightweight IoT devices. The protocol is based on PUF technology and implements security attributes such as anonymity, confidentiality, untraceability, forward security, and resistance to modeling attacks. The authors validated the protocol’s security using formal security models and ProVerif, demonstrating that it offers significant advantages in terms of computational, storage, and communication overhead, making it ideal for resource-constrained IoT devices.
Ma et al. [
17] proposed PUF-RAKE, a lightweight and highly reliable authentication and key establishment protocol based on PUF. By employing error correction and dynamic CRP obfuscation techniques, the protocol enables efficient device authentication while preventing masquerading, brute force, replay, and modeling attacks. By implementing error correction on the server side and utilizing a lightweight stream authentication mechanism, PUF-Rake significantly reduces resource usage while maintaining security, making it particularly suitable for resource-constrained IoT devices.
Bian et al. [
18] proposed Bio-AKA, a two-factor user authentication and key protocol that combines PUF with fingerprint biometrics. By employing PUF technology and a fuzzy extractor, the scheme enables secure user authentication and key negotiation without a password, protects user anonymity and privacy, and prevents fingerprint information leakage.
Many existing solutions in this area struggle with excessive performance overhead and high computational and communication costs, particularly in resource-constrained environments. In this paper, we introduce PUF technology, combined with hash functions and XOR operations, to achieve lightweight two-way authentication and secure communication between devices. This approach reduces computational and communication costs while enhancing privacy protection and resistance to attacks, effectively addressing the limitations of previous solutions.
Additionally, this paper provides a comparative analysis of the aforementioned works [
10,
11,
12,
13,
14,
15,
16,
17,
18] in the subsequent chapters. In summary, the diverse solutions proposed in recent years for IIoT M2M security protocols have notably enhanced security measures, especially for lightweight IIoT devices with limited resources. Nonetheless, these schemes still face challenges related to performance, computational overhead, and practical application. Therefore, further research and optimization are needed to balance security and availability, and to enhance their applicability in real-world scenarios.
3. Preliminaries
In this Section, we examine the necessity of using the MQTT-SN protocol in the context of IIoT and its associated challenges in resource-constrained networks. Next, we introduce the selection criteria for PUFs and their application in IIoT devices, with a focus on addressing the jitter problem in PUF outputs [
19]. Finally, we briefly discuss the ProVerif, emphasizing its role in analyzing and verifying security protocols. This discussion lays the foundation for subsequent research, aiming to enhance the security and reliability of protocol design in IIoT systems.
3.1. IIoT MQTT-SN Environment and Constraints
The expansion of the IIoT model introduces challenges in quickly detecting and assessing attacks on co-existing systems. One of the most common methods used by cybercriminals is exploiting vulnerabilities in communication protocols, which can enable them to access, modify, and delete data, or even disable devices or entire infrastructure. In the context of IIoT, the MQTT protocol is widely used due to its portability, enabling resource-constrained devices to communicate with each other [
20]. To enhance its effectiveness, a lightweight version of the protocol, MQTT-SN, has emerged. MQTT-SN is suitable for Wireless Sensor Networks (WSNs), networks that do not support TCP/IP, and those with limited bandwidth. In these constrained network environments, MQTT-SN extends MQTT’s functionality, including features such as subject name registration, gateway discovery, sleep and wake mechanisms, and different Quality of Service (QoS) levels [
21]. The architecture diagram of the MQTT-SN protocol is shown in
Figure 1.
In the IIoT field, MQTT-SN can adapt to various network environments by utilizing different underlying protocols, including but not limited to 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) [
22]. 6LoWPAN is a network protocol designed for low-power wireless personal area networks, such as IEEE 802.15.4 standard devices [
23]. It enables these devices to communicate over IPv6, efficiently using limited bandwidth and adapting to scenarios requiring low power consumption and high network reliability [
24]. When 6LoWPAN is used as the underlying protocol, it introduces a fragmentation mechanism to support larger packet transfers, as it was designed to accommodate the small packet structure of the IEEE 802.15.4 standard, which typically has a maximum payload of 127 bytes [
25]. However, to ensure efficient communication, the maximum data size for a single packet without fragmentation is usually limited to the maximum frame size of IEEE 802.15.4. After subtracting the security header, MAC layer header, and 6LoWPAN header, the remaining data available for applications are approximately 40 to 100 bytes, depending on header usage and security settings. This limitation is why MQTT-SN is designed to reduce message size and optimize data transfer for resource-constrained network environments.
In the IIoT field, where MQTT-SN and 6LoWPAN are used as low-level communication protocols, restricted devices typically exhibit characteristics such as low power consumption, limited processing power, small storage space, low bandwidth connections, and simplified communication protocols [
26]. According to RFC 7228, restricted devices are roughly categorized into Class 0 (C0), Class 1 (C1), and Class 2 (C2) devices. In this field, restricted devices mainly refer to Class 1 and Class 2 devices, which can support 6LoWPAN and MQTT-SN/MQTT communication, either directly or through appropriate adaptation layers [
27]. These devices can effectively participate in the IIoT network, performing data collection, processing, and communication tasks despite their limited resources. Since the protocol discussed in this article utilizes PUF and requires a long-term private key and secure storage area, it is not suitable for extremely restricted devices, such as Class 0 devices.
3.2. Selection and Description of PUFs
PUF is a security technology based on the unique physical characteristics of hardware. It leverages the minute physical variations that occur during device manufacturing to generate a unique and irreproducible “fingerprint” for device authentication and key generation. PUF technology is inherently unpredictable and unique, making it highly effective against counterfeiting and cloning attacks, which presents significant advantages for resource-constrained IoT devices. In this study, we utilize PUF technology to generate unpredictable responses, combined with hash functions and XOR operations, to implement a lightweight two-way authentication and secure communication protocol. This solution not only effectively counters forgery and replay attacks, but also significantly reduces computational and communication overhead while enhancing the device’s privacy protection capabilities.
PUFs are widely used in the security field, particularly in device authentication and key generation. Based on their physical characteristics and implementation methods, PUFs can be categorized into silicon-based PUFs, optical PUFs, acoustic PUFs, magnetic PUFs, and biological PUFs. Silicon-based PUFs further include SRAM PUFs, array PUFs, and flip-chip PUFs [
28]. In the IIoT, a simple and feasible PUF implementation is based on SRAM. This type of PUF leverages the random behavior of SRAM when the storage unit is not initialized to generate a unique fingerprint. The advantages of SRAM PUFs include easy implementation and high resistance to replication, but they require a certain amount of storage space to generate sufficient entropy. However, this PUF can be implemented using existing inherent equipment [
29].
However, regardless of the type of PUF, it is susceptible to environmental changes (temperature, voltage, humidity, etc.) and equipment aging, which can lead to output errors. Therefore, in practical applications, minimizing output jitter is crucial. Several commonly used methods can significantly reduce PUF output jitter and the likelihood of errors. These methods include the following: first, designing a robust PUF structure to maintain output consistency under different operating conditions; second, calibrating the environment and operating conditions to record the PUF output under standard conditions before use; third, applying error correction coding (such as Hamming code, BCH code, or Reed-Solomon code) to ensure that the original PUF output can be reconstructed even if an error occurs in the PUF response; additionally, reliability can be further improved through response filtering and post-processing algorithms, such as conformance testing to remove unstable bits and retain only those that remain consistent across multiple measurements; finally, by performing multiple measurements and statistical analysis of the PUF, the response with the least variation is selected as the effective output, reducing the impact of output jitter.
3.3. ProVerif Tool
ProVerif is a powerful automated tool for analyzing and validating security protocols, based on the formalized pi-calculus model. It can automatically verify security attributes such as confidentiality, authentication, and forward security by simulating the behavior of potential attackers. ProVerif helps detect security vulnerabilities in protocols and analyzes how they perform under different attacker models [
30].
The advantage of this tool lies in its automated processing capability, enabling rapid verification of complex protocol designs and greatly reducing the effort and error likelihood associated with manual analysis. ProVerif is widely used in academic research and practical engineering to analyze network security protocols, such as TLS and IPsec, ensuring they are designed and implemented to withstand various known attacks.
Given its powerful verification capabilities, ProVerif is an indispensable tool in secure protocol design and analysis, particularly in scenarios requiring a high degree of security.
3.4. Security Mechanism
The fail-stop mechanism is a protective strategy designed to immediately terminate the current operation or protocol execution if the system detects an anomaly or potential security threat, preventing further damage or information disclosure. The core idea of this mechanism is to ensure that the system does not further expose its vulnerabilities or allow attackers to exploit them by halting operations when it cannot determine whether it is safe to continue. This mechanism activates when the system detects errors, abnormal behavior, or potential attacks, such as replay attacks, man-in-the-middle attacks, desynchronization attacks, or other security threats, causing the system to immediately stop the current process. This prevents erroneous data from being further processed and blocks attackers from exploiting erroneous states.
To ensure that the protocol can respond promptly to potential attacks or abnormal conditions, this paper introduces the fail-stop mechanism. This mechanism prevents further damage or information leakage by halting protocol operations as soon as an error or abnormal behavior is detected. The fail-stop mechanism is particularly effective against threats such as denial-of-service (DoS) attacks and replay attacks, providing an additional layer of security to the system by aborting operations promptly.
4. Proposed Protocol Scheme
Before presenting the protocol scheme, this Section outlines the basic assumptions and required environment for the protocol design. This Section not only provides the necessary background to understand how the protocol works but also clarifies its applicability and limitations. The protocol environment is then described in detail, including the participants, required hardware, and assumptions about operating conditions.
4.1. Environment and Assumptions
In the communication model based on the MQTT-SN protocol presented in this paper, the main roles are the Device and the Broker. The Device typically refers to an endpoint in an IoT environment, such as a sensor, actuator, or any other smart device capable of connecting to the network. The Broker, on the other hand, receives, processes, and forwards messages, acting as a server that manages connections, sessions, and message routing for all clients. Although it is somewhat equivalent to a server, the term “Broker” is used to emphasize its role in message forwarding and management, rather than as a traditional server, especially in the context of the MQTT-SN protocol [
31].
In this research, the relationship between the Device and the Broker is one-to-many. The Device is resource-constrained, while the Broker is resource-unrestricted. The protocol is initiated by the Device, and the Broker responds. The protocol is divided into three phases: registration, authentication and secret key exchange, and PUF shuffling. Both parties need to store pre-shared data, including a pre-shared secret key (PSK), a pre-shared secret (S), and 30 sets of CRPs assumed for the PUF. The protocol does not include an independent logout phase; devices that have not been contacted for a long time are considered logged out. Additionally, this paper assumes that both communicating parties are equipped with long-term secret keys at the factory. The pre-shared secret, AID, and CRP messages are stored in the non-volatile memory (NVM, such as EEPROM) of the device, and in the broker’s database. The PSK is stored encrypted with the long-term secret key of both parties. The derived shared secret, denoted as S, is safeguarded in the device’s secure storage compartment, potentially within a Hardware Security Module (HSM), and similarly within the broker’s secure environs, perhaps utilizing the broker’s Trusted Platform Module (TPM) for enhanced security.
The QoS mechanism of the MQTT protocol offers varying degrees of message transmission guarantees through three levels (QoS 0, 1, 2). QoS 0 does not guarantee message delivery, QoS 1 ensures the message is delivered at least once, potentially with duplication, and QoS 2 ensures the message is delivered only once without duplication. This mechanism allows for flexible selection of message reliability and transmission overhead based on requirements in resource-constrained network environments. The QoS mechanism of the MQTT-SN protocol is cleverly embedded into multiple design stages to ensure the reliability and security of data transmission. The QoS mechanism plays a key role, particularly in ensuring message transmission and security. For example, when a message is transmitted between a device and a Broker, the QoS level determines whether the message may be sent multiple times to ensure successful delivery. In the AKE phase, the proposed protocol requires MQTT QoS Level 3, which includes an acknowledgment mechanism to ensure that the message is neither lost nor duplicated, assuming the MQTT communication link remains intact.
In this paper, the administrator must determine the bit lengths of all parameters, the frequency of CRP updates, the survival time of encrypted sessions, and the maximum error counter value based on the specific usage scenario. Under typical conditions without special security requirements, this paper assumes that the input and output of the PUF are 128-bit binary, the hash function uses SHA3-256, truncating the first 128 bits as the output, and other parameters such as the pre-shared secret key and secret S are 128 bits, while the timestamp is 64 bits. The session survival time is set to 24 h, and the number of CRPs updated at a time is 30 (implying a PUF update cycle of approximately 30 days). The error counter is capped at 5, and when it reaches this limit, corresponding actions will be taken, such as blocking the channel or triggering an alarm. This protocol assumes that all entities are equipped with an error counter for any step involving parameter verification, such as verifying the consistency of hash values, during protocol operations. With this design, the system can issue an out-of-band alarm to the upper layer when a specific error counter exceeds a predetermined threshold while implementing the fail-stop mechanism. This mechanism supports attack detection across the entire system.
Finally, the protocol assumes that the PUF has undergone the error correction processing described in
Section 3.2, and the specific details of this processing are not further elaborated.
Table 1 lists all the symbols used in this paper and their descriptions.
The proposed scheme consists of three main phases: the Registration phase, the Authentication and Key Exchange phase, and the PUF-Shuffling phase. The specific steps for each phase are detailed below.
4.2. Registration Phase
This phase takes place in a secure channel between the device and the Broker, and the device synchronizes the clock with the Broker. The steps are shown in
Figure 2.
Step 1: Device ← Broker, .
The Broker generates a random number group , pre-shared key PSK, and random number S containing 30 pieces of information and packages them as , then generates a random number with the same length as , performs an XOR operation with it, and finally sends the obtained result to the Device.
Step 2: Device → Broker, .
Upon receiving , the Device generates a new random number of the same length as it and sends its XOR result back to the Broker over the secure channel.
Step 3: Device ← Broker, .
Upon receiving , the Broker generates a new random number of the same length as it and sends their XOR result back to the Device over the secure channel.
Step 4: Device → Broker, .
The Device receives , generates a new random number of the same length, obtains their XOR result and sends it back to the Broker. The Device computes the PUF response sequence based on the received random number . And use these PUF responses to generate a new key PSK ‘and a random number S’ Then, the Device generates a random identifier AID and sends the message containing the identifier AID and the XOR result of PSK ‘and S’ to the Broker through a secure channel.
Step 5: Device ← Broker, .
Upon receiving , the Broker generates a new random number and sends the XOR result of message and back to the Device through the secure channel.
Step 6: Device → Broker, .
The Device generates a new random number and sends the received message with the XOR result of to the Broker over a secure channel.
Step 7: Broker.
The Broker computes the hash of the PUF CRPs and generates the encrypted key information .
At the end of this phase, the device and the Broker will each maintain a record of the other. Specifically, the device stores <AID, C|32, DK ⊕ PSK> in NVM and <S> in a secure storage area. The Broker stores <AID, C-HRPs, BK ⊕ PSK> in its database and <S> in a secure storage area.
4.3. Authentication and Key Exchange Phase
This phase occurs in an open channel between the device and the Broker. To ensure communication security in an insecure environment, the protocol employs encryption and authentication mechanisms. The steps are illustrated in
Figure 3.
Step 1: Device → Broker, .
The device generates a random number ; obtains the current timestamp ; calculates , where represents XOR operation, h is a hash function, is a pre-shared key, and is the state of the device; sends to the broker.
Step 2: Device ← Broker, .
The broker verifies the validity of the timestamp by obtaining the current timestamp and checks whether it is smaller than the . Uses the device to find relevant data in the database; then, calculates , uses the resulting sum, and hash and checks whether the result is equal with ; if not, the protocol is terminated, the error count is increased by 1, and the system determines whether to send an alarm to the upper layer. Otherwise, then select a challenge-response to CRP from the database and generate a random number ; calculate and ; at this point, CRP is marked in the database as used, and is sent to the device.
Step 3: Device → Broker, .
The device obtains the current timestamp again and checks if it is less than ; if not, terminate the protocol operation. Otherwise, if the time is valid, the device removes C|16 (timeout challenge) from the challenge manager CM and makes sure is new. After the device calculates and checks the value of , where , ; the device then computes the new , , and SK; device generation ; brings new ; finally, the device sends to the broker.
After calculating the new , , and , the device must also store the previous values of , , and . This ensures that synchronization with the Broker can be restored in case of a power outage, system restart, or desynchronization attack. The specific recovery process is as follows: First, the device attempts to send msg1, generated using the new synchronization data, to the Broker and waits for a response. If no response is received after three attempts, the device then tries to send msg1 generated from the previous synchronization data. If there is still no response after another three attempts, the device repeats the process after a waiting period, continuing until synchronization is successfully restored.
Step 4: Device ← Broker, .
The broker obtains the current timestamp and checks if it is less than ; if not, terminate the protocol operation. Otherwise, calculate ; update in the database; then, calculate; calculate and ; calculate the session key ; check whether CRP in the database is less than 2; if is received, then PUF shuffling is performed. Last, send to the device.
Step 5: Next steps (optional).
Once the broker sends msg4, it means that the server finds C-HRPs exhausted. Shuffling is required. Thus, the PUF shuffling phase is entered.
4.4. PUF Shuffling Phase
This phase occurs in an insecure channel between the device and the broker. These steps are shown in
Figure 4.
Step 1: When the time since the last CRP update exceeds a certain threshold (e.g., 25 days), or the number of CRPs stored by the broker is less, after completing the AKE phase above, the broker sends an optional response .
Step 2: After receiving msg5, the device decrypts the received information with SK to verify whether the result is equal to ; if they are equal, enter the PUF update phase, generate 30 16-bit random numbers, and save each 16-bit number as an element to the array C|16. On SET, , (On SET is a circular completion of lack of bits) is calculated, and is sent to Broker.
Step 3: After receiving it, the Broker decrypts it, verifies it, generates 30 112-bit random numbers, concatenates them one by one to C|16, forms a complete C, and then sends it to the device.
After receiving it, the device inputs C one by one into the PUF to obtain R, which is spliced into CRP and sent to the Broker.
Upon receipt, the Broker validates, hashes all the responses in the new CRP, and overwrites the resulting CRPs into the database.
At this point, the PUF shuffling phase is complete.
7. Conclusions
This paper proposes an authenticated and encrypted channel establishment scheme based on lightweight PUF technology to enhance the security of the MQTT-SN protocol in the IoT environment. By integrating hardware security features and modern encryption technology, the scheme effectively addresses the security and privacy challenges in IoT device communication and demonstrates significant advantages.
First, this paper designs a lightweight security protocol that uses PUF technology to generate unpredictable responses, combines XOR operations and hash functions to achieve mutual authentication and secure communication between the device and the Broker, and maintains low computation and communication overhead in resource-constrained environments. Second, formal verification is conducted using the ProVerif tool, combined with informal analysis, to demonstrate the protocol’s effectiveness in resisting common security threats such as replay attacks, man-in-the-middle attacks, and impersonation attacks. Third, the scheme emphasizes the anonymity and untraceability of the device, ensuring that it cannot be identified or tracked by an attacker across different communication rounds, thereby effectively protecting the device’s privacy. Finally, the comprehensive fail-stop feature enhances the protocol’s attack awareness, allowing the system to quickly respond and send an alarm signal when an attack is detected, enabling timely defensive measures.
In terms of practical performance, the proposed protocol demonstrates excellent efficiency, with a total computation cost of only 0.58 milliseconds and a communication cost of 608 bits (76 bytes). Compared to similar schemes, the proposed protocol reduces computational cost by at least 43% and communication cost by approximately 10%. These quantitative results verify the efficiency and feasibility of the proposed scheme in practical applications, particularly for resource-constrained IoT devices. In conclusion, the proposed PUF-based MQTT-SN protocol provides an efficient and secure solution for IoT communication, fully demonstrating the significant potential of PUF technology in enhancing IoT security.
While this paper has delved into the security challenges of the MQTT protocol within the M2M context of the Client/Server architecture, there are numerous uncharted territories within the IIoT that warrant further exploration. Our future endeavors will extend to encompass a broader spectrum of scenarios, including multicast communication, Device-to-Device (D2D) interactions, and the unique constraints of resource-limited IIoT settings. To this end, we intend to leverage a suite of advanced, yet lightweight, cryptographic methodologies. Our overarching objective is to cultivate a suite of security protocols that are not only robust but also adaptable to the diverse and evolving demands of the IIoT landscape.