2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS) 2019
DOI: 10.1109/ises47678.2019.00079
|View full text |Cite
|
Sign up to set email alerts
|

PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…Qureshi et al, [11] proposed a PUF-based identitypreserving authentication protocol, called PUF-IPA, for T2M authentication scheme. Similar to the concept used in [12], the protocol uses shuling techniques to store obfuscated and uncorrelated information about the registered devices' PUFs in the server instead of storing the challenge and response pairs (CRPs) of registered devices in plaintext. The server can authenticate the registered devices without having the original CRPs stored on its database.…”
Section: Identity Preservingmentioning
confidence: 99%
“…Qureshi et al, [11] proposed a PUF-based identitypreserving authentication protocol, called PUF-IPA, for T2M authentication scheme. Similar to the concept used in [12], the protocol uses shuling techniques to store obfuscated and uncorrelated information about the registered devices' PUFs in the server instead of storing the challenge and response pairs (CRPs) of registered devices in plaintext. The server can authenticate the registered devices without having the original CRPs stored on its database.…”
Section: Identity Preservingmentioning
confidence: 99%
“…Also, the protocol has a security single point of failure that allows the entire system to be compromised. Yanambaka et al, [14] proposed an FPGA PUF-based authentication protocol for medical IoT devices. It applies an obfuscation technique to perform authentication without CRPs disclosure.…”
Section: Pufs (Physical Unclonable Functions)mentioning
confidence: 99%
“…We note that this method of obfuscating the response by combining two responses together into one single response is inspired by the concept of distributed value used in cryptography [9]. Also, the idea of using the PUF function of both authenticating parties to construct responses is inspired by the work of Yanambaka et al, in [14].…”
Section: A the Concept Of Extended Crps (Ecrps)mentioning
confidence: 99%
“…Such a Cloud-Fog-Edge architecture provides the processing support needed by the IoHT constrained devices. This way, IoHT technologies can contribute to improve performance, reduce costs and mitigate risk [12][13][14][15][16][17]. However, although the IoHT have been adopted to monitor people everywhere, there is a place where technology must be much more efficient due to its inherent criticality: the hospital.…”
Section: Introductionmentioning
confidence: 99%