2022
DOI: 10.1155/2022/8865158
|View full text |Cite
|
Sign up to set email alerts
|

PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home

Abstract: Various IoT-based applications such as smart home, intelligent medical, and VANETs have been put into practical utilization. The smart home is one of the most concerned environments, allowing users to access and control smart devices via the public network remotely. The smart home can provide many intelligent services for users through these smart devices. To securely access devices and obtain collected data over the public network, multifactor authentication protocols for smart home have gained wide attention… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 48 publications
0
19
0
Order By: Relevance
“…They asserted that MITM and tampering attacks are powerless against their scheme due to the proposed scheme performs mutual authentication based on the secret key generated by the PUF response. Xia et al [26] proposed a PUF-assisted group authentication scheme for the smart home that establishes a group session key between the home user and the home device by utilizing the chinese remainder theorem. Although their schemes [24]- [26] resist device capture attack utilizing PUF, they does not consider the verifier stolen attack, which can compromise all user communications by exploiting the verification table stored on the gateway.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…They asserted that MITM and tampering attacks are powerless against their scheme due to the proposed scheme performs mutual authentication based on the secret key generated by the PUF response. Xia et al [26] proposed a PUF-assisted group authentication scheme for the smart home that establishes a group session key between the home user and the home device by utilizing the chinese remainder theorem. Although their schemes [24]- [26] resist device capture attack utilizing PUF, they does not consider the verifier stolen attack, which can compromise all user communications by exploiting the verification table stored on the gateway.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we estimate the computational consumption and communication cost to evaluate the performance of the proposed authentication scheme. Furthermore, we compare the security functionality of our scheme with related authentication schemes [10], [19], [21]- [26].…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Several group AKA methods have been presented to achieve the aims of the mutual AKA between the group members and their network, whether used for group mobile authentication or machine type devices (MTDs) authentication. Privacy preservation and network overhead reduction are the most important aims for this type of communication [12]. This section presents a summary of the available group-AKA protocols.…”
Section: Introductionmentioning
confidence: 99%
“…When using GPRS technology, mobile phones are assigned IP addresses over the Internet, which in most cases are not unique. Edge technology is the next step in the evolution of GPRS technology (improved data rates for GSM evolution, faster data transfer for GSM development) [17][18][19]. In this technology, new information encoding schemes have been used compared to GPRS, and the error handling algorithm has been changed (incorrectly sent packets are not sent back, only information for their recovery is sent) [20].…”
Section: Introductionmentioning
confidence: 99%