2019
DOI: 10.1109/tdsc.2018.2832201
|View full text |Cite
|
Sign up to set email alerts
|

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
124
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 209 publications
(133 citation statements)
references
References 27 publications
0
124
0
Order By: Relevance
“…The authors applied the hash of firmware along with PUF response to detect software and hardware impersonation attacks. Chatterjee et al proposed an authentication scheme that combines the concepts of PUF, identity-based encryption (IBE), and keyed hash function to eliminate the need for explicitly storing CRPs [41]. Braeken et al [42] proved that this protocol is vulnerable to the man-in-the-middle (MITM) attack, impersonation, and replay attacks [43].…”
Section: Prior Workmentioning
confidence: 99%
“…The authors applied the hash of firmware along with PUF response to detect software and hardware impersonation attacks. Chatterjee et al proposed an authentication scheme that combines the concepts of PUF, identity-based encryption (IBE), and keyed hash function to eliminate the need for explicitly storing CRPs [41]. Braeken et al [42] proved that this protocol is vulnerable to the man-in-the-middle (MITM) attack, impersonation, and replay attacks [43].…”
Section: Prior Workmentioning
confidence: 99%
“…RFID tags [3]. While a number of lightweight authentication protocols have been proposed in [4,5,6,7,8], none of them offers a complete security solution in the context of the key three qualities of lightweight mutual authentication, availability and tag unclonability. Therefore, none of them is truly secure solution in providing fraud protection, secure access and anti-counterfeiting.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, Fu et al [5] employs a symmetric encryption to guarantee data confidentiality and integrity, but managing and storing the secret key is a major weakness, and the system could be vulnerable if this key is compromised [9]. There are other approaches which rely on the use of PUF technology, which enhances the resilience of RFID systems against tag cloning attacks [7,8]. Gope et al [7] proposed a mutual authentication protocol using a Hash function and a PUF.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the PUFs are unique to their device and can be used as a security primitive to enable device-based identification, and authentication. More importantly, PUFs can provide a low cost alternative solution for on-demand generation of cryptographic keys from the device rather than the conventional methods, where the secret keys are produced and distributed by the server and stored in the IoT device memories [8].…”
Section: Introductionmentioning
confidence: 99%