2021
DOI: 10.1109/access.2021.3103889
|View full text |Cite
|
Sign up to set email alerts
|

PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs

Abstract: A Physical Unclonable Function (PUF) provides a physical device a unique output for a given input, which can be regarded as the device's digital fingerprint. Thus, PUFs can provide unique identities for billions of connected devices in Internet of Things (IoT) architectures. Plenty of PUF based authenticated key exchange (AKE) protocols have been proposed. However, most of them are designed for the authentication between an IoT node and the specific server/verifier, whom the IoT node registered with. Only a fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…From Table 6, the rough total execution time of the proposed drone to GCS mutual authentication protocol is 12.58 ms. It is very less when compared to the works Ko et al, 43 Alladi et al, 41 Alladi et al, 18 Li et al, 64 Chuang et al, 63 and Chatterjee et al. 21 But it is slightly higher than that of Nyangaresi et al, 39 Pu et al, 17 and Alladi et al.…”
Section: Computation Cost Analysismentioning
confidence: 69%
See 2 more Smart Citations
“…From Table 6, the rough total execution time of the proposed drone to GCS mutual authentication protocol is 12.58 ms. It is very less when compared to the works Ko et al, 43 Alladi et al, 41 Alladi et al, 18 Li et al, 64 Chuang et al, 63 and Chatterjee et al. 21 But it is slightly higher than that of Nyangaresi et al, 39 Pu et al, 17 and Alladi et al.…”
Section: Computation Cost Analysismentioning
confidence: 69%
“…The proposed drone to drone mutual authentication protocol consists of three messages (from Figure 5) and has 1184 bits as the total communication cost. This is very less when compared to the communication cost of Alladi et al, 18 Chatterjee et al, 21 Braeken et al, 20 Jan et al, 32 et al, 63 Li et al, 64 Alladi et al, 41 and Ko et al. 43 Thus, the proposed mechanism achieves a very low communication cost compared to all the other schemes, making it the most suitable protocol for drone networks.…”
Section: Communication Cost Analysismentioning
confidence: 97%
See 1 more Smart Citation
“…The There are some existing methods that servers the purpose of contributing for the lightweight security key handling in practice which are comparable to the proposed method. Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things [11], Noisy Vibrational Pairing of IoT Devices [12], Blending Physically Unclonable functions with Identity Based Encrytption for Authentication and Key Exchange in IoT's [13], IoT-friendly AKE: forward secrecy and session resumption meet symmetric-key cryptography [14], A Lightweight Authentication and Key-Exchange Mechanism for 6LoWPAN-based Internet of Things [15], New Enhanced Authentication Protocol for Internet of Things [16], PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs [17], Secure Mutual Authentication and Key-Exchange Protocol Between PUF-Embedded IoT Endpoints [18] and Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme [19] are the existing methods chosen over here to compare with the proposed method in terms of standard network performance metrics.…”
Section: Existing Methodsmentioning
confidence: 99%
“…Chatterjee et al [ 6 ] developed an authentication and key exchange protocol combining PUFs, identity-based encryption (IBE), and the keyed hash function. Chuang et al [ 7 ] designed a PUF-based authenticated key exchange protocol for IoT devices without verifiers and an explicit challenge–response pair (CRP). Using certificateless public key cryptography (CL-PKC), Li et al [ 8 ] proposed a PUF-based end-to-end mutual authentication and key exchange protocol for IoT devices.…”
Section: Introductionmentioning
confidence: 99%