2021
DOI: 10.1007/s12652-021-03421-4
|View full text |Cite
|
Sign up to set email alerts
|

A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…Priyanka et al [41] investigate the performance and security of different PUF mechanisms and find that these approaches do not take both MitM attacks and software/physical impersonation attacks into consideration at the same time. For instance, the existing approach proposes Challenge-Response (CRP) based PUF protocols [45], [53], [15] to prevent replay attacks and software impersonation attacks. are proposed to solve this problem.…”
Section: Related Workmentioning
confidence: 99%
“…Priyanka et al [41] investigate the performance and security of different PUF mechanisms and find that these approaches do not take both MitM attacks and software/physical impersonation attacks into consideration at the same time. For instance, the existing approach proposes Challenge-Response (CRP) based PUF protocols [45], [53], [15] to prevent replay attacks and software impersonation attacks. are proposed to solve this problem.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, most researchers, such as [76,77], when designing PUFs with IoT devices/servers use five methods of encryption that still suffer from cyberattacks, which are as follows:…”
Section: Analysis Of Puf-based Authentication and Its Applicationsmentioning
confidence: 99%
“…However, the CRPs are recorded in a database, which may pose a risk of vulnerability to PUF modeling attacks. Nimmy et al [32] developed an authentication scheme by integrating geometric threshold secret sharing with PUFs. Such a solution is designed to prevent storing CRPs in the verifier's database.…”
Section: Related Workmentioning
confidence: 99%