2017
DOI: 10.1109/jiot.2017.2703088
|View full text |Cite
|
Sign up to set email alerts
|

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
160
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 253 publications
(160 citation statements)
references
References 19 publications
0
160
0
Order By: Relevance
“…Wazid et al [33] proposed a secure and very light-weight three-factor authentication scheme that applies smart cards, passwords, and personal biometrics, which proves to be secure formally. Aman et al [34] proposed a mutual authentication scheme using physical unclonable functions (PUFs). The scheme contributes to establishing session keys between a device and a server or two devices.…”
Section: Authorization Phasementioning
confidence: 99%
“…Wazid et al [33] proposed a secure and very light-weight three-factor authentication scheme that applies smart cards, passwords, and personal biometrics, which proves to be secure formally. Aman et al [34] proposed a mutual authentication scheme using physical unclonable functions (PUFs). The scheme contributes to establishing session keys between a device and a server or two devices.…”
Section: Authorization Phasementioning
confidence: 99%
“…The light and secure authentication is an essential and important for IoTs, especially when IoTs are dealing with an immense number of devices. One of the state-of-the-art solutions for IoTs is a Physical Unclonable Function (PUF)-based authentication [37,38]. PUFs are digital fingerprints of IoTs which utilize the physical disorder of random nanoscale phenomena.…”
Section: Scalable and Secure Internet Of Things Connectivitymentioning
confidence: 99%
“…www.ijacsa.thesai.org Moreover, Critical process in IoT-eHealth including security, data analysis, mobility, and adaptation, if performed at the gateway, i.e., the Fog layer, rather than the Cloud can significantly improve overall system performance [5]. Current literature, such as [6][7][8] seems to either have ignored the realization of security capabilities at this layer or have provided stringent solutions, or have focused on a particular threat type or security objective.…”
Section: Introductionmentioning
confidence: 99%