2020
DOI: 10.26599/tst.2019.9010072
|View full text |Cite
|
Sign up to set email alerts
|

ePUF: A lightweight double identity verification in IoT

Abstract: Remote authentication is a safe and verifiable mechanism. In the Internet of Things (IoT), remote hosts need to verify the legitimacy of identity of terminal devices. However, embedded devices can hardly afford sufficient resources for the necessary trusted hardware components. Software authentication with no hardware guarantee is generally vulnerable to various network attacks. In this paper, we propose a lightweight remote verification protocol. The protocol utilizes the unique response returned by Physical … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 31 publications
0
17
0
Order By: Relevance
“…Instead, visual attention networks [37][38][39][40][41] are proposed to automatically locate the informative regions without part and bounding box annotations by the self-attention mechanism, and show superiority in the fine-grained image classification task [21,[42][43][44]. Liu et al [21] use a reinforcement learning framework to adaptively locate the discriminative regions.…”
Section: Related Workmentioning
confidence: 99%
“…Instead, visual attention networks [37][38][39][40][41] are proposed to automatically locate the informative regions without part and bounding box annotations by the self-attention mechanism, and show superiority in the fine-grained image classification task [21,[42][43][44]. Liu et al [21] use a reinforcement learning framework to adaptively locate the discriminative regions.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, gather prediction can greatly help the city government react in advance and significantly reduce the losses and risks caused by vicious gatherings [1,2]. As an indispensable part of smart transportation, gather prediction mainly leverages the trajectory data collected by various Internet of Things sensing devices [3][4][5][6] (such as mobile phones [7], cars, and other GPS devices [8]). These trajectory data include multiple types of patterns such as walking, driving, and public transportation.…”
Section: Introductionmentioning
confidence: 99%
“…Physical unclonable functions (PUFs) are new low-cost hardware security primitive with a comparatively simple design ideal for smart and energy-constrained IoT devices. Recent research has proposed to use PUF for low-cost IoT authentications and encryption schemes [4]- [6]. However, the secret keys generated by the proposed PUF may suffer from reliability issues which negatively impact the security and trust in IoT applications.…”
Section: Introductionmentioning
confidence: 99%
“…Different types of sPUFs designs have been proposed as lightweight hardware-based security solutions for IoT applications, detection of physical attacks, i.e. physical tampering and reverse engineering, and hardware Trojan attacks [1]- [6], [15], [24]- [29]. Further, sPUFs have recently emerged as promising hardware-based security primitive to protect consumer electronic devices against invasive and non-invasive attacks.…”
Section: Introductionmentioning
confidence: 99%