2021
DOI: 10.1016/j.iot.2020.100343
|View full text |Cite
|
Sign up to set email alerts
|

Multifactor authentication scheme using physically unclonable functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…An authentication and key exchange protocol for smart home IoT system was recently proposed in Fakroon et al (2021), Fakroon et al (2020. The protocol used a multifactor authentication algorithm to preserve user anonymity and untraceability.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…An authentication and key exchange protocol for smart home IoT system was recently proposed in Fakroon et al (2021), Fakroon et al (2020. The protocol used a multifactor authentication algorithm to preserve user anonymity and untraceability.…”
Section: Related Workmentioning
confidence: 99%
“…In Fakroon et al (2020), the IoT edge devices were assumed to have secret keys stored in NVRAM. Fakroon et al (2021) employed a PUF that gave the IoT edge devices unique identities (IDs). The authors analyzed the proposed schemes through formal analysis using the Burrows-Abadi-Needham logic (BAN), informal analysis and model check using the automated validation of internet security protocols and applications (AVISPA) tool.…”
Section: Related Workmentioning
confidence: 99%
“…For the client to be authenticated successfully, that response should be valid and the same as what the server expects it to be, as the server already knows the challenge-response pair (CRP) from before [ 31 ].…”
Section: Physical Unclonable Function (Puf)mentioning
confidence: 99%
“…It uses physiological or behavioral aspects of humans as a means of authenticating personal identity [3]. Physiological characteristics include those retrieved from the human body, such as iris [4], faces [5,6], retinas, veins [7], fingerprints [8][9][10][11], palm prints, finger knuckle print, and DNA, ECG [12][13][14][15], while behavioral characteristics include voice, stride, signature, and keystroke [16][17][18][19][20]. Biometrics traits are commonly employed in systems such as Security in IoT [21][22][23][24][25], e-banking [26][27][28][29], cloud security [30][31][32][33], access control [34][35][36][37], network security systems [38][39][40][41][42], and ID cards [43][44][45][46][47], and other applications related to IoT [48]…”
Section: Introductionmentioning
confidence: 99%