2017
DOI: 10.1145/3005715
|View full text |Cite
|
Sign up to set email alerts
|

A PUF-Based Secure Communication Protocol for IoT

Abstract: Security features are of paramount importance for the Internet of Things (IoT), and implementations are challenging given the resource-constrained IoT setup. We have developed a lightweight identity-based cryptosystem suitable for IoT to enable secure authentication and message exchange among the devices. Our scheme employs a Physically Unclonable Function (PUF) to generate the public identity of each device, which is used as the public key for each device for message encryption. We hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
117
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 159 publications
(117 citation statements)
references
References 30 publications
0
117
0
Order By: Relevance
“…For the PUF based key agreement protocols between two IoT nodes with the aid of a common server (taking the role of TTP), who has stored the challenge-response pairs of the PUFs from the different nodes, Chatterjee et al recently proposed a protocol in [3]. The public keys of the devices are generated using the PUF results, followed by an identity based encryption mechanism for the actual secure communication.…”
Section: Key Agreement Between Two Iot Devicesmentioning
confidence: 99%
See 4 more Smart Citations
“…For the PUF based key agreement protocols between two IoT nodes with the aid of a common server (taking the role of TTP), who has stored the challenge-response pairs of the PUFs from the different nodes, Chatterjee et al recently proposed a protocol in [3]. The public keys of the devices are generated using the PUF results, followed by an identity based encryption mechanism for the actual secure communication.…”
Section: Key Agreement Between Two Iot Devicesmentioning
confidence: 99%
“…For an easier comparison and replacement of a solution, we consider similar architecture and protocol phases as in [3].…”
Section: System Architecturementioning
confidence: 99%
See 3 more Smart Citations