2022
DOI: 10.1007/978-3-030-94285-4_8
|View full text |Cite
|
Sign up to set email alerts
|

A Quantum-Resistant and Fast Secure Boot for IoT Devices Using Hash-Based Signatures and SRAM PUFs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
0
0
Order By: Relevance
“…Therefore, the main intention of our additional work in this field is not only to remove pre-fabricated secrets but also to make them more difficult to extract through direct physical attacks, even if they are dynamic and unique to begin with. While there are other excellent contributions to the combined application of PUFs and IoT such as [23] or [24] , our main goal is symbiotic security design, which, with the notion of SKMS, now not only utilises PUFs but improves the resilience against traditional PUF threats themselves (modelling, side-channel, fault injection attacks, etc.) through yet another symbiotic relationship rather than simply assuming the PUF unit to be entirely secure on its own.…”
Section: Practical Discussion Of Embedded Identities For Iot and Addi...mentioning
confidence: 99%
“…Therefore, the main intention of our additional work in this field is not only to remove pre-fabricated secrets but also to make them more difficult to extract through direct physical attacks, even if they are dynamic and unique to begin with. While there are other excellent contributions to the combined application of PUFs and IoT such as [23] or [24] , our main goal is symbiotic security design, which, with the notion of SKMS, now not only utilises PUFs but improves the resilience against traditional PUF threats themselves (modelling, side-channel, fault injection attacks, etc.) through yet another symbiotic relationship rather than simply assuming the PUF unit to be entirely secure on its own.…”
Section: Practical Discussion Of Embedded Identities For Iot and Addi...mentioning
confidence: 99%
“…In this paper, the author proposed a remote authentication method against the tampered IoT device hardware or detection of firmware alteration of the IoT device [20]. They use Root of Trust for Measuring and Reporting (RoTMR) by using a physical unclonable function (PUB) and hash-based signature to confirm ROM data [21]. i) Application Layer: It is the first interactive layer concerning the end user.…”
Section: B Five Layer Architecturementioning
confidence: 99%