2022
DOI: 10.3390/math10224310
|View full text |Cite
|
Sign up to set email alerts
|

Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices

Abstract: Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…Zerrouki et al [ 21 ] proposed a mutual authentication and session key establishment protocol for IoT devices based on PUFs. Sun and Tian [ 22 ] further gave security analysis and improvements to this protocol and suggested the idea of a key compromise to evaluate other novel PUF protocol designs. Wang et al [ 23 ] introduced a supplementary sub-protocol to the PUF-based authentication protocol for the purpose of enhancing resistance to desynchronization attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Zerrouki et al [ 21 ] proposed a mutual authentication and session key establishment protocol for IoT devices based on PUFs. Sun and Tian [ 22 ] further gave security analysis and improvements to this protocol and suggested the idea of a key compromise to evaluate other novel PUF protocol designs. Wang et al [ 23 ] introduced a supplementary sub-protocol to the PUF-based authentication protocol for the purpose of enhancing resistance to desynchronization attacks.…”
Section: Introductionmentioning
confidence: 99%