Lightweight and privacy-preserving two-factor authentication scheme for IoT devices

P Gope, B Sikdar - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT
devices are deployed in the open and public places, which makes them vulnerable to …

A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of Medical …

P Gope, O Millwood, B Sikdar - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a revolutionary paradigm, moving toward ubiquity in
day-to-day life and used in several applications such as smart healthcare systems, industry …

A provably secure authentication scheme for RFID-enabled UAV applications

P Gope, O Millwood, N Saxena - Computer Communications, 2021 - Elsevier
Abstract Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a
substantial number of novel identification and authentication based systems such as Radio …

A lightweight puf-based authentication protocol using secret pattern recognition for constrained iot devices

TA Idriss, HA Idriss, MA Bayoumi - IEEE Access, 2021 - ieeexplore.ieee.org
PUFs, or physical unclonable functions, are hardware security primitives that can offer
lightweight security solutions for constrained devices through challenge-response …

Recyclable pufs: Logically reconfigurable pufs

S Katzenbeisser, Ü Kocabaş, V Van Der Leest… - Journal of Cryptographic …, 2011 - Springer
Abstract Physically Unclonable Functions (PUFs) are security primitives that exploit intrinsic
random physical variations of hardware components. In the recent years, many security …

Short paper: Lightweight remote attestation using physical functions

S Schulz, AR Sadeghi, C Wachsmann - … of the fourth ACM conference on …, 2011 - dl.acm.org
Remote attestation is a mechanism to securely and verifiably obtain information about the
state of a remote computing platform. However, resource-constrained embedded devices …

PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication

K Mahmood, S Shamshad, M Rana, A Shafiq… - Journal of Information …, 2021 - Elsevier
The momentous development in the technology of wireless communication has escalated
the wide acceptance of Device to Device (D2D) communication among mobile devices …

Providing destructive privacy and scalability in RFID systems using PUFs

M Akgün, MU Çaǧlayan - Ad Hoc Networks, 2015 - Elsevier
Abstract Internet of Things (IoT) emerges as a global network in which any things (including
humans and the real world things) having unique identifier can communicate each other …

Towards a unified security model for physically unclonable functions

F Armknecht, D Moriyama, AR Sadeghi… - Topics in Cryptology-CT …, 2016 - Springer
Abstract The use of Physically Unclonable Functions (PUFs) in cryptographic protocols
attracted an increased interest over recent years. Since sound security analysis requires a …