2021
DOI: 10.1145/3466682
|View full text |Cite
|
Sign up to set email alerts
|

PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network

Abstract: The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…PUF has been used for key generation [ 59 , 60 ], key sharing [ 61 ], group key establishment [ 62 ], and IP protection [ 63 , 64 ] in hardware security area. Also, PUF has become a viable work topic for IoT security and privacy due to resource constraints and access difficulties of IoT devices and found a wide variety of uses in the field [ 65 67 ]. Maurya and Bagchi propose a unilateral factor authentication mechanism for use in RFID systems [ 65 ].…”
Section: Physically Unclonable Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…PUF has been used for key generation [ 59 , 60 ], key sharing [ 61 ], group key establishment [ 62 ], and IP protection [ 63 , 64 ] in hardware security area. Also, PUF has become a viable work topic for IoT security and privacy due to resource constraints and access difficulties of IoT devices and found a wide variety of uses in the field [ 65 67 ]. Maurya and Bagchi propose a unilateral factor authentication mechanism for use in RFID systems [ 65 ].…”
Section: Physically Unclonable Functionmentioning
confidence: 99%
“…In a different field, due to resource constraints in IoT meters, Boyapally et al proposed a PUF-based authentication mechanism that performs cryptographic operations on the server to provide secure communication between smart meters at consumers and the servers at the utility operators [ 66 ]. There are also studies on the use of PUF in the authentication and key-sharing processes of sensors in the wireless sensor network (WSN) [ 67 ].…”
Section: Physically Unclonable Functionmentioning
confidence: 99%
“…Recently, lightweight PUF-based Authentication and Key Exchange protocols have received some attention in several IoT-related fields, including wireless sensor networks (WSNs) [16,18], Smart Homes [19], Remote Healthcare [20], Automotive Technology [21], and Internet of Drones [22]. Yet, the absence of formal verification, the need to maintain the CRP database at the Server end, and the use of complex cryptographic engines along with lightweight PUF instances render those protocols hostile and less suited for widespread implementation.…”
Section: Introductionmentioning
confidence: 99%
“…If the user's identification is confirmed, the server enables the legitimate user to log in and access the services demanded. Several schemes [1][2][3][4] , have been proposed for authenticated wireless communication.…”
Section: Introductionmentioning
confidence: 99%