A review of physical unclonable functions (PUFs) and its applications in IoT environment
A Yadav, S Kumar, J Singh - Ambient Communications and Computer …, 2022 - Springer
This paper describes various studies about physical unclonable functions, and it inspires
use of physical unclonable functions over conventional security mechanisms and compares …
use of physical unclonable functions over conventional security mechanisms and compares …
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain
The combination of the Internet of Things (IoT) and cloud-edge (CE) paradigm promises to
be an efficient system to aggregate and further process huge volumes of data from IoT …
be an efficient system to aggregate and further process huge volumes of data from IoT …
A PUF-based modeling-attack resilient authentication protocol for IoT devices
M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …
Provably secured lightweight authenticated key agreement protocol for modern health industry
Abstract Internet of Medical Things (IoMT) has facilitated the healthcare industry by providing
ease of communication among doctors and patients living in remote areas for accomplishing …
ease of communication among doctors and patients living in remote areas for accomplishing …
PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications
Peer to Peer (P2P) or direct connection IoT has become increasingly popular owing to its
lower latency and higher privacy compared to database-driven or server-based IoT …
lower latency and higher privacy compared to database-driven or server-based IoT …
A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks
L Zhang, J Xu, MS Obaidat, X Li… - IET …, 2022 - Wiley Online Library
With the advancement of information technology and the reduction of costs, the application
of unmanned aerial vehicle (UAV) has gradually expanded from the military field to the …
of unmanned aerial vehicle (UAV) has gradually expanded from the military field to the …
A modeling attack resistant deception technique for securing lightweight-PUF-based authentication
Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution
for low-cost device authentication. Due to practical constraints in preventing phishing …
for low-cost device authentication. Due to practical constraints in preventing phishing …
Lessons learned: Analysis of PUF-based authentication protocols for IoT
K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …
where entities prove their identities to each other and generally establish and derive …
Device-specific security challenges and solution in IoT edge computing: a review
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …
IoT devices vary in terms of shape, size, storage, battery life, and computational power …