2020
DOI: 10.3390/cryptography4010008
|View full text |Cite
|
Sign up to set email alerts
|

A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications

Abstract: The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-authentic devices. It is necessary to authenticate an edge device over an unsecured channel to safeguard the network from being infiltrated through these fake devices. The implementation of security features demands extensive computational power and a large hardware… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…In addition, a PUF can be used in the key management scheme of chip locking techniques [10]- [13]. In a resourceconstrained smart IoT edge device, a PUF can be used for lightweight low-cost authentication protocols [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, a PUF can be used in the key management scheme of chip locking techniques [10]- [13]. In a resourceconstrained smart IoT edge device, a PUF can be used for lightweight low-cost authentication protocols [14], [15].…”
Section: Introductionmentioning
confidence: 99%