2022
DOI: 10.32604/cmc.2022.027118
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authentication Protocol Based on Physical Unclonable Function

Abstract: In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy, storage, and processing. Although recently many lightweight schemes have been proposed, to the best of our knowledge, they are unable to address the problem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Superlattice chip can be regarded as a physical unclonable function (PUF) [28], which has important security significance. We can ensure the security of the key through the security management system and process of the superlattice chip.…”
Section: Security Analysis Of Superlattice Based Symmetric Keymentioning
confidence: 99%
“…Superlattice chip can be regarded as a physical unclonable function (PUF) [28], which has important security significance. We can ensure the security of the key through the security management system and process of the superlattice chip.…”
Section: Security Analysis Of Superlattice Based Symmetric Keymentioning
confidence: 99%