Lightweight and privacy-preserving two-factor authentication scheme for IoT devices
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT
devices are deployed in the open and public places, which makes them vulnerable to …
devices are deployed in the open and public places, which makes them vulnerable to …
A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of Medical …
The Internet of Things (IoT) is becoming a revolutionary paradigm, moving toward ubiquity in
day-to-day life and used in several applications such as smart healthcare systems, industry …
day-to-day life and used in several applications such as smart healthcare systems, industry …
A provably secure authentication scheme for RFID-enabled UAV applications
Abstract Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a
substantial number of novel identification and authentication based systems such as Radio …
substantial number of novel identification and authentication based systems such as Radio …
A lightweight puf-based authentication protocol using secret pattern recognition for constrained iot devices
PUFs, or physical unclonable functions, are hardware security primitives that can offer
lightweight security solutions for constrained devices through challenge-response …
lightweight security solutions for constrained devices through challenge-response …
Recyclable pufs: Logically reconfigurable pufs
S Katzenbeisser, Ü Kocabaş, V Van Der Leest… - Journal of Cryptographic …, 2011 - Springer
Abstract Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic
random physical variations of hardware components. In the recent years, many security …
random physical variations of hardware components. In the recent years, many security …
Short paper: Lightweight remote attestation using physical functions
S Schulz, AR Sadeghi, C Wachsmann - … of the fourth ACM conference on …, 2011 - dl.acm.org
Remote attestation is a mechanism to securely and verifiably obtain information about the
state of a remote computing platform. However, resource-constrained embedded devices …
state of a remote computing platform. However, resource-constrained embedded devices …
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication
The momentous development in the technology of wireless communication has escalated
the wide acceptance of Device to Device (D2D) communication among mobile devices …
the wide acceptance of Device to Device (D2D) communication among mobile devices …
Providing destructive privacy and scalability in RFID systems using PUFs
M Akgün, MU Çaǧlayan - Ad Hoc Networks, 2015 - Elsevier
Abstract Internet of Things (IoT) emerges as a global network in which any things (including
humans and the real world things) having unique identifier can communicate each other …
humans and the real world things) having unique identifier can communicate each other …
Iot device security: Challenging “a lightweight rfid mutual authentication protocol based on physical unclonable function”
With the exponential increase of Internet of things (IoT) connected devices, important
security risks are raised as any device could be used as an attack channel. This …
security risks are raised as any device could be used as an attack channel. This …
Towards a unified security model for physically unclonable functions
F Armknecht, D Moriyama, AR Sadeghi… - Topics in Cryptology-CT …, 2016 - Springer
Abstract The use of Physically Unclonable Functions (PUFs) in cryptographic protocols
attracted an increased interest over recent years. Since sound security analysis requires a …
attracted an increased interest over recent years. Since sound security analysis requires a …