2019 International Conference on Information and Communication Technology Convergence (ICTC) 2019
DOI: 10.1109/ictc46691.2019.8939751
|View full text |Cite
|
Sign up to set email alerts
|

PUF based IoT Device Authentication Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…For example, it might consist of a generation of 2 N CRP for a strong arbiter PUF of N bits (i.e., for a challenge of 16 bits, there are more than 60,000 CRPs) [57]. The direct usage of CRP generated by PUF requires that the server stores a large amount of CRP pairs, escalating proportionally to the number of devices [58]. Considering that the user already has an invasive authenticator registered with their bank (e.g., smartphone), the enrollment of the trusted IoT device can be classified as a binding of an additional authenticator at existing authentication assurance level.…”
Section: Enrollmentmentioning
confidence: 99%
“…For example, it might consist of a generation of 2 N CRP for a strong arbiter PUF of N bits (i.e., for a challenge of 16 bits, there are more than 60,000 CRPs) [57]. The direct usage of CRP generated by PUF requires that the server stores a large amount of CRP pairs, escalating proportionally to the number of devices [58]. Considering that the user already has an invasive authenticator registered with their bank (e.g., smartphone), the enrollment of the trusted IoT device can be classified as a binding of an additional authenticator at existing authentication assurance level.…”
Section: Enrollmentmentioning
confidence: 99%
“…3.1.7 Single CRP-based Authentication Protocol for IoT. Kim et al, [16] proposed a PUF-based authentication protocol to allow a smart device to be authenticated by a server. The protocol tries to reduce the load issue of storing all the CRPs of all registered devices on a particular server (i.e., trust center) by storing only one CRP, (c d i , r d i ), per device d i , at a time.…”
Section: Lessonsmentioning
confidence: 99%
“…So it consumes considerable computing resources. To reduce the risk of authentication key exposure and the authentication server's burden, Byoungkoo Kim et al [30] proposed a PUF-based authentication scheme for IoT devices. Through interaction with the device, only a single CRP is stored and updated.…”
Section: Related Workmentioning
confidence: 99%