Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2021, 4(1); doi: 10.25236/AJCIS.2021.040102.

Secure identity authentication scheme based on PUF for IoUT


Jie Zhou

Corresponding Author:
Jie Zhou

Department of Information Engineering ,Shanghai Maritime University,China


The existing identity authentication schemes based on the devices of Internet of Underwater Things (IouT) are all executed at the network layer and higher layers, which require high computing costs and are not suitable for devices with limited computing resources. By applying PUF to key binding, a physical layer-based identity authentication scheme is proposed. The authentication process is realized by the joint typicality coding and decoding technology based on the packing lemma and the covering lemma. The Achievability and Converse propositions prove the feasibility of the scheme, and the confidential capacity domain is delimited from the perspective of information theory. The false authentication analysis theoretically limits the probability of successful deception by the adversary, and reduces it to the lowest limit.


physically uncloneable function, authentication, false acceptance, encoding, mutual information

Cite This Paper

Jie Zhou. Secure identity authentication scheme based on PUF for IoUT. Academic Journal of Computing & Information Science (2021), Vol. 4, Issue 1: 7-14. https://doi.org/10.25236/AJCIS.2021.040102.


[1] Wei Zhiqiang. Research on the security of underwater sensor networks [J]. Chinese Journal of Computers, 2012, 35 (8): 1595-1605.

[2] Zeng Ling, Wang Wei. Research on the Security and Secrecy System of Underwater Sensor Networks [J]. Communication Technology, 2019, 52 (1): 202-206.

[3] David Galindo, Rodrigo Roman, Javier Lopez.A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks [C] //International Conference on Cryptology and Network Security, NJ: CANS, 2008: 120-132.

[4] Chi Yuan, Wenping Chen, Yuqing Zhu,Deying Li, Jie Tan. A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network [C] //11thInternational Conference on Mobile Ad-hoc and Sensor Networks, NJ: IEEE, 2010: 116-123.

[5] Chae-Won Yun, Jae-Hoon Lee, Okyeon Yi, Soo-Hyun Park. Ticket-based Authentication Protocol for Underwater Wireless Sensor Network [C] //Eighth International Conference on Ubiquitous and Future Networks, NJ: IEEE, 2016: 215-217.

[6] Roee Diamant,Paolo Casari,Stefano Tomasin.Cooperative Authentication in Underwater Acoustic Sensor Networks [J]. IEEE Transactions on Wireless Communications, 2019, 18 (2): 954-968.

[7] Liang Xiao, Xiaoyue Wan, Wei Su. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks [J]. IEEE Communications Letters, 2019, 23 (1): 60-63.

[8] B.R.Chandavarkar, Akhilraj V.Gadagkar. Mitigating Localization and Neighbour Spoofifing Attacks in Underwater Sensor Networks [C] //11th International Conference on Computing,Communication and Networking Technologies, NJ: IEEE, 2020.

[9] Yin Win Xin,Jia Yong Zhe,Gao Yan Song,et al.A Survey of Physical Unclonal Function (PUF) Research [J]. Network Security Technology and Application, 2018 (06): 41-42+54.

[10] Zhang Zi Nan. Research and application of physical unclonable functions [D]. PLA Information Engineering University, 2013.

[11] Zhou Kai. Research on the reliability of physical unclonable functions based on FPGA [D]. Hefei University of Technology, 2019. 

[12] RoelMaes.PhysicallyUnclonable Functions [M]. Springer: Berlin, Heidelberg, November 2013:129-130.

[13] Frans M. J. Willems, Tanya Ignatenko. Authentication Based on Secret-Key Generation [C].//IEEE International Symposium on Information Theory Proceedings. Cambridge, MA, USA: IEEE, 2012: 1792-1796.