Blockchain-based authentication for IIoT devices with PUF
With the continuous development of edge computing and IIoT technology, there are growing
types of IIoT devices, and the number of such devices is continuously climbing. It is …
types of IIoT devices, and the number of such devices is continuously climbing. It is …
T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT
K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …
Things), in general, and authentication, in particular, has become a serious research …
D2D-MAP: A drone to drone authentication protocol using physical unclonable functions
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …
Physically secure and conditional-privacy authenticated key agreement for VANETs
To avoid physically extracting secrets from the storage of devices, Physical Unclonable
Function (PUF) is used in various authentication schemes. In these schemes, after the …
Function (PUF) is used in various authentication schemes. In these schemes, after the …
An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities
X Xia, S Ji, P Vijayakumar, J Shen… - … of Distributed Sensor …, 2021 - journals.sagepub.com
Internet of Things devices are responsible for collecting and transmitting data in smart cities,
assisting smart cities to release greater potential. As Internet of Things devices are …
assisting smart cities to release greater potential. As Internet of Things devices are …
Lessons learned: Analysis of PUF-based authentication protocols for IoT
K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …
where entities prove their identities to each other and generally establish and derive …
Provably secure and lightweight authentication key agreement scheme for smart meters
S Chai, H Yin, B Xing, Z Li, Y Guo… - … on Smart Grid, 2023 - ieeexplore.ieee.org
Smart Grid is an indispensable part of the Internet of Things (IoT) and has the potential to
revolutionise the electricity energy industry. Smart meters, as an important component of …
revolutionise the electricity energy industry. Smart meters, as an important component of …
Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things
Group authenticated key agreements (GAKAs) for an Internet of Medical Things (IoMT)
enable medical sensor devices to authenticate each other and agree upon a common …
enable medical sensor devices to authenticate each other and agree upon a common …
Physically related functions: Exploiting related inputs of PUFs for authenticated-key exchange
This paper initiates the study of “Cryptophasia in Hardware”–a phenomenon that allows
hardware circuits/devices with no pre-established secret keys to securely exchange secret …
hardware circuits/devices with no pre-established secret keys to securely exchange secret …
A novel privacy preserving scheme for smart grid-based home area networks
Despite the benefits of smart grids, concerns about security and privacy arise when a large
number of heterogeneous devices communicate via a public network. A novel privacy …
number of heterogeneous devices communicate via a public network. A novel privacy …