2011 7th International Conference on Wireless Communications, Networking and Mobile Computing 2011
DOI: 10.1109/wicom.2011.6040366
|View full text |Cite
|
Sign up to set email alerts
|

PUF-Based Node Mutual Authentication Scheme for Delay Tolerant Mobile Sensor Network

Abstract: As an emerging network, Delay Tolerant Mobile Sensor Network (DTMSN) is susceptible to be attacked because of its limited resources and intermittent connectivity. Though authentication technology is usually used to prevent network from attacks, it is a challenging work in delay tolerant circumstance. In this paper, a node mutual authentication scheme based on Physical Unclonable Function (PUF) is proposed for DTMSN. We take advantage of the physical characteristics of chips with PUFs to prevent sensor nodes fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…PUFs are also used in the symmetric-key authentication protocol proposed by [12]. Finally, PUFs are applied to authentication of mobile sensor network nodes in [41]. The idea is to prevent an array of attacks which are possible when physical access to a node is possible.…”
Section: Signature Generationmentioning
confidence: 99%
“…PUFs are also used in the symmetric-key authentication protocol proposed by [12]. Finally, PUFs are applied to authentication of mobile sensor network nodes in [41]. The idea is to prevent an array of attacks which are possible when physical access to a node is possible.…”
Section: Signature Generationmentioning
confidence: 99%
“…TSS [116,117], PNMA [120], SE-PUF [122], HSTRS [116], and RAPD [123] where PUF outputs were used to authenticate the network nodes, and sometimes additional formation was added to the PUF output to help in the authentication process such as the node location.…”
Section: Managing Wrong Responses With Agingmentioning
confidence: 99%
“…Liu , et al [64] used PUF based on a double‐data‐rate in DDR3 memory for key generating in WSN (PDKGW). Yang , et al [120] built a PUF‐based node mutual authentication (PNMA) scheme for delay‐tolerant mobile sensor networks (DTMSNs), which are similar to WSN. Danev , et al also used PUF as physical‐layer identification of wireless devices (PLIWDs) [121].…”
Section: Applications Of Pufmentioning
confidence: 99%
“…They also proposed a destructive private authentication protocol for RFID systems. Furthermore, recently, several new authentication mechanisms based on PUF functions have been proposed in order to enhance their security and privacy levels .…”
Section: Preliminariesmentioning
confidence: 99%