2020 International Conference on Information and Communication Technology Convergence (ICTC) 2020
DOI: 10.1109/ictc49870.2020.9289260
|View full text |Cite
|
Sign up to set email alerts
|

PUF-based Authentication Scheme for IoT Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Many studies have been conducted on using PUF to authenticate IoT applications [41][42][43][44]. One of the important reasons is that the use of PUF provides a solution to the problem of storing keys in IoT devices vulnerable to tampering.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many studies have been conducted on using PUF to authenticate IoT applications [41][42][43][44]. One of the important reasons is that the use of PUF provides a solution to the problem of storing keys in IoT devices vulnerable to tampering.…”
Section: Related Workmentioning
confidence: 99%
“…Thanks to the PUF, instead of storing the key in the device, when authentication is required, the key is generated in the PUF. Yoon et al proposed an authentication mechanism based on the usage of PUF on the client-side [41]. In [42], a PUF-based key agreement scheme has been presented for IoT devices.…”
Section: Related Workmentioning
confidence: 99%