A review of physical unclonable functions (PUFs) and its applications in IoT environment

A Yadav, S Kumar, J Singh - Ambient Communications and Computer …, 2022 - Springer
This paper describes various studies about physical unclonable functions, and it inspires
use of physical unclonable functions over conventional security mechanisms and compares …

PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain

Y Zhang, B Li, B Liu, Y Hu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The combination of the Internet of Things (IoT) and cloud-edge (CE) paradigm promises to
be an efficient system to aggregate and further process huge volumes of data from IoT …

A PUF-based modeling-attack resilient authentication protocol for IoT devices

M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …

Provably secured lightweight authenticated key agreement protocol for modern health industry

M Abdussami, R Amin, S Vollala - Ad Hoc Networks, 2023 - Elsevier
Abstract Internet of Medical Things (IoMT) has facilitated the healthcare industry by providing
ease of communication among doctors and patients living in remote areas for accomplishing …

PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications

Y Zheng, W Liu, C Gu, CH Chang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its
lower latency and higher privacy compared to database-driven or server-based IoT …

A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks

L Zhang, J Xu, MS Obaidat, X Li… - IET …, 2022 - Wiley Online Library
With the advancement of information technology and the reduction of costs, the application
of unmanned aerial vehicle (UAV) has gradually expanded from the military field to the …

A modeling attack resistant deception technique for securing lightweight-PUF-based authentication

C Gu, CH Chang, W Liu, S Yu, Y Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution
for low-cost device authentication. Due to practical constraints in preventing phishing …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …