2020
DOI: 10.3390/cryptography4010008
|View full text |Cite
|
Sign up to set email alerts
|

A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications

Abstract: The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-authentic devices. It is necessary to authenticate an edge device over an unsecured channel to safeguard the network from being infiltrated through these fake devices. The implementation of security features demands extensive computational power and a large hardware… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 50 publications
0
6
0
Order By: Relevance
“…The authentication protocols present in the literature can be categorized as PUF based [15]- [25], blockchain based [26]- [32], and PUF and blockchain based [33]- [48] according to the state-of-the-art. In this section, only PUF and blockchain based authentication protocols are discussed which are undeniably robust, immutable and secured in terms of privacy, integrity, and confidentiality of both the device and data.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The authentication protocols present in the literature can be categorized as PUF based [15]- [25], blockchain based [26]- [32], and PUF and blockchain based [33]- [48] according to the state-of-the-art. In this section, only PUF and blockchain based authentication protocols are discussed which are undeniably robust, immutable and secured in terms of privacy, integrity, and confidentiality of both the device and data.…”
Section: Related Workmentioning
confidence: 99%
“…which are generated using ID extraction algorithm based on SRAM PUF [15]. After the successful registration of devices, the consortium blockchain gives a corresponding transaction hash (TX) through which the same Ri can be relocated in the consortium blockchain during the authentication phase.…”
Section: Papermentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, a PUF can be used in the key management scheme of chip locking techniques [10]- [13]. In a resourceconstrained smart IoT edge device, a PUF can be used for lightweight low-cost authentication protocols [14], [15].…”
Section: Introductionmentioning
confidence: 99%