2020 IEEE 17th Annual Consumer Communications &Amp; Networking Conference (CCNC) 2020
DOI: 10.1109/ccnc46108.2020.9045264
|View full text |Cite
|
Sign up to set email alerts
|

PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…The server includes a random number (nonce) and employs a hashing function in its request; such a number is used by the device in generating the pseudo response. Similarly, PUF-IPA [51] applies a cryptographic hash of the PUF response and stores only hashed (and encrypted) values in the database that is securely accessible by the verifier. Although the SRAM-PUF based authentication scheme of [52] uses the SRAM address instead of the challenge, it still applies a cryptographic hash and uses a nonce.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The server includes a random number (nonce) and employs a hashing function in its request; such a number is used by the device in generating the pseudo response. Similarly, PUF-IPA [51] applies a cryptographic hash of the PUF response and stores only hashed (and encrypted) values in the database that is securely accessible by the verifier. Although the SRAM-PUF based authentication scheme of [52] uses the SRAM address instead of the challenge, it still applies a cryptographic hash and uses a nonce.…”
Section: Related Workmentioning
confidence: 99%
“…Computational Overhead [51] Applying cryptographic hash function to the PUF response High computational and hardware overhead [52] Applying cryptographic hash function to the response of SRAM PUF SRAM PUF has a limited range of CRPs; Computational overhead; susceptibility to the man-in-the-middle attack due to using repetitive nonce [53] Authentication by XORing the PUF response with the previous responses when a predefined chain of challenges is used…”
Section: Refmentioning
confidence: 99%
“…However, the protocol was shown to be vulnerable to spoofing and message forging attacks. Qureshi et al, [13] proposed a PUF-based identity-preserving authentication protocol for T2M authentication scheme. The protocol uses shuffling techniques to store obscured and uncorrelated information about the registered devices' PUFs instead of storing plaintext CRPs (Challenge-Response Pairs).…”
Section: Pufs (Physical Unclonable Functions)mentioning
confidence: 99%
“…IoT node's authentication target Aysu et al [8] Yu et al [9] Gao et al [10] Che et al [11] Mahalat et al [12] Gope and Sikdar [13] Liang et al [14] Zhu et al [15] Akhundov et al [16] Byun [17] Qureshi and Munir [18] Server…”
Section: Enrollment Centermentioning
confidence: 99%