2017
DOI: 10.1007/978-3-319-53177-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(25 citation statements)
references
References 32 publications
0
25
0
Order By: Relevance
“…While most PUF based protocols were initially planned for an ideal environment with limited applicability in real situations, some researchers proposed authentication protocols for real and noisy environments [30,31,32,33]. For example, Ray et al [34] released a PUF based protocol for object tracking in IoT application in real environments.…”
Section: Rfid Authentication Protocols Using Pufmentioning
confidence: 99%
See 1 more Smart Citation
“…While most PUF based protocols were initially planned for an ideal environment with limited applicability in real situations, some researchers proposed authentication protocols for real and noisy environments [30,31,32,33]. For example, Ray et al [34] released a PUF based protocol for object tracking in IoT application in real environments.…”
Section: Rfid Authentication Protocols Using Pufmentioning
confidence: 99%
“…For example, Ray et al [34] released a PUF based protocol for object tracking in IoT application in real environments. In addition, Huth et al proposed a protocol that can resist against noisy environment [33]. Nevertheless, their protocol needs an extra channel for transferring data and they use an exhaustive search in the database to retrieve the tag’s information.…”
Section: Rfid Authentication Protocols Using Pufmentioning
confidence: 99%
“…Besides, their protocol can support forward secrecy. However, Huth et al [42] revealed that this protocol can leak sensitive data potentially and is vulnerable to tracing attacks. They made up this flaw in their enhanced protocol but an additional channel-based key agreement phase is needed.…”
Section: Related Workmentioning
confidence: 99%
“…Not only Bendavid et al [46] but most of the existing schemes also keep secret parameters in tag memory. For instance, all the schemes mentioned above do so except Aysu et al [41] and Huth et al [42]. Similar to them, Gope et al [47] stores no secret parameters in tag memory but only a temporary identity and a set of unique unlinkable pseudo-identities, which are also shared by the backend server to prevent desynchronization attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation