2015
DOI: 10.1145/2818186
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Lightweight Entity Authentication with Strong PUFs

Abstract: Abstract. Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC 'fingerprint'. Therefore, they have been envisioned as an IC authentication mechanism, in particular the subclass of so-called strong PUFs. The protocol proposals are typically accompanied with two PUF promises: lightweight and an increased resistance against physical attacks. In this work, we review nineteen proposals in chronologica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
124
1
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 151 publications
(127 citation statements)
references
References 58 publications
1
124
1
1
Order By: Relevance
“…The revealed flaw differs from existing attacks by Delvaux et al [9] and Becker [3] that apply to the original protocol [28] exclusively. The latter attacks comprehend the modeling of the highly correlated arbiter PUF via repeated helper data exposure; a preemptive fix can be found in the PhD thesis of Maes [19].…”
Section: A Fundamental Security Flaw In Reverse Fuzzy Extractorscontrasting
confidence: 54%
See 2 more Smart Citations
“…The revealed flaw differs from existing attacks by Delvaux et al [9] and Becker [3] that apply to the original protocol [28] exclusively. The latter attacks comprehend the modeling of the highly correlated arbiter PUF via repeated helper data exposure; a preemptive fix can be found in the PhD thesis of Maes [19].…”
Section: A Fundamental Security Flaw In Reverse Fuzzy Extractorscontrasting
confidence: 54%
“…7 presents numerical results for various BCH codes. We focus on small codes, as these allow for an exact exhaustive evaluation of the residual minentropy using (8) and/or (9). As such, the tightness of various bounds can be assessed adequately.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As such, they present a unique challenge-response value. The challenge-response value of each PUF is registered in the server's PUF DB before sensors are distributed to the field [33][34][35][36]. Values that are used once are removed from the PUF's DB.…”
Section: Previous Studies On Smart Homesmentioning
confidence: 99%
“…The unreliable nature of PUF outputs, the vulnerabilities of these sensor nodes to physical attacks, and ad-hoc nature of these protocols have resulted in many security flaws which can be manipulated by the adversaries. In [30], Delvaux et al presented the security flaws of 19 different strong PUF-based authentication protocols which indicates that developing an ideal low-cost authentication protocol for IoT/CPS sensor nodes is still a challenge.…”
Section: Low-resource Communication and Computationmentioning
confidence: 99%