2021
DOI: 10.1109/jiot.2021.3068410
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Aware PUFs-Based Multiserver Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 50 publications
(28 citation statements)
references
References 54 publications
0
28
0
Order By: Relevance
“…The use of bit-serial and digit-serial multipliers, used in [19,20], results in a decrease in hardware resources (area) with a decrease in performance of the architecture (compared with bitparallel modular multipliers). Therefore, there are numerous area-constrained applications such as internet of things [10], radio frequency identification [11,12], and teleoperated robotic systems [13], that require low-cost hardware architectures to perform PM operation in a reasonable time (latency). Subsequently, this work provides a PM architecture with the consideration of hardware resources.…”
Section: State-of-the-art Pm Architecturesmentioning
confidence: 99%
See 2 more Smart Citations
“…The use of bit-serial and digit-serial multipliers, used in [19,20], results in a decrease in hardware resources (area) with a decrease in performance of the architecture (compared with bitparallel modular multipliers). Therefore, there are numerous area-constrained applications such as internet of things [10], radio frequency identification [11,12], and teleoperated robotic systems [13], that require low-cost hardware architectures to perform PM operation in a reasonable time (latency). Subsequently, this work provides a PM architecture with the consideration of hardware resources.…”
Section: State-of-the-art Pm Architecturesmentioning
confidence: 99%
“…The applications that require software implementations are (i) OpenSSL protocols [6], (ii) bitcoin digital signatures [7], (iii) image encryption/ decryption [8,9], and many others. Similarly, the applications that require hardware implementations of ECC are (i) internet of things [10], (ii) radio frequency identification [11,12], (iii) teleoperated robotic systems [13], (iv) network servers [14], and several others. The applications highlighted in [10][11][12][13] require low-cost (or area optimized) implementations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The security of IoT terminal hardware design should be considered adequately; otherwise, an attacker can obtain the key through a side channel attack or other technical means [3]. An embedded PUF can be used as the physical fingerprint for lightweight authentication, which can effectively improve the security of the device [4][5][6][7]. However, once the PUF response is leaked, it will lead to serious risk of security for the authentication system [8].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the carry propagation in the prime field needs more area than the polynomial addition in the binary field. Therefore, the binary field F 2 m is more suitable for hardware implementation [7]. For this reason, all the calculations in this paper are carried out on binary field F 2 m .…”
Section: Introductionmentioning
confidence: 99%