Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.1109/access.2022.3208347
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF

Abstract: With the continuous development of Internet of Things (IoT) technology, research on smart home environments is being conducted by many researchers. In smart home environments, home users can remotely access and control a variety of home devices such as smart curtains, lights, and speakers placed throughout the house. Despite providing convenient services, including home monitoring, temperature management, and daily work assistance, smart homes can be vulnerable to malicious attacks because all messages are tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(20 citation statements)
references
References 48 publications
0
8
0
Order By: Relevance
“…PV-based smart homes now play an active role in the national grid. Extra energy generated through photovoltaic cells in smart homes can now be traded through an electric grid [153,154]. 10.3.…”
Section: Energy Management Systems In Shsmentioning
confidence: 99%
“…PV-based smart homes now play an active role in the national grid. Extra energy generated through photovoltaic cells in smart homes can now be traded through an electric grid [153,154]. 10.3.…”
Section: Energy Management Systems In Shsmentioning
confidence: 99%
“…Another class of protocols has been developed to include the device's fingerprint throughout the authentication process to prevent such attacks. Such a fingerprint may be produced by a physically unclonable function(PUF) [43][44][45][46][47][48]. The security of such protocols may seem promising if the PUF being used behaves in an ideal manner (i.e., behave fully reliable and random); however, the PUF response relies on the environment and is not entirely random.…”
Section: Related Workmentioning
confidence: 99%
“…Protocol Class [4][5][6][7][8][9][10][11][12][13] Ultralightweight [43][44][45][46][47][48] PUF based [52][53][54][55] Smartcard based [56][57][58][59] Biometric based [40][41][42] Blockchain based…”
Section: Protocolmentioning
confidence: 99%
“…The paper [28] proposed the secure user authentication and key agreement scheme using physical unclonable functions for preventing the security problems, used Real-or-Random model and Burrows-Abadi-Needham logic for verification of the session key security and mutual authentication, used too the Automated Validation of Internet Security Protocols and Applications tool for simulation of the scheme resistance to security attacks.…”
Section: міжнародний науковий журналmentioning
confidence: 99%