Blockchain-based authentication for IIoT devices with PUF

D Li, R Chen, D Liu, Y Song, Y Ren, Z Guan… - Journal of Systems …, 2022 - Elsevier
With the continuous development of edge computing and IIoT technology, there are growing
types of IIoT devices, and the number of such devices is continuously climbing. It is …

T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT

K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …

D2D-MAP: A drone to drone authentication protocol using physical unclonable functions

K Lounis, SHH Ding… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …

Physically secure and conditional-privacy authenticated key agreement for VANETs

Y Liang, E Luo, Y Liu - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
To avoid physically extracting secrets from the storage of devices, Physical Unclonable
Function (PUF) is used in various authentication schemes. In these schemes, after the …

An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities

X Xia, S Ji, P Vijayakumar, J Shen… - … of Distributed Sensor …, 2021 - journals.sagepub.com
Internet of Things devices are responsible for collecting and transmitting data in smart cities,
assisting smart cities to release greater potential. As Internet of Things devices are …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …

Provably secure and lightweight authentication key agreement scheme for smart meters

S Chai, H Yin, B Xing, Z Li, Y Guo… - … on Smart Grid, 2023 - ieeexplore.ieee.org
Smart Grid is an indispensable part of the Internet of Things (IoT) and has the potential to
revolutionise the electricity energy industry. Smart meters, as an important component of …

Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things

TF Lee, X Ye, SH Lin - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Group authenticated key agreements (GAKAs) for an Internet of Medical Things (IoMT)
enable medical sensor devices to authenticate each other and agree upon a common …

Physically related functions: Exploiting related inputs of PUFs for authenticated-key exchange

D Chatterjee, H Boyapally, S Patranabis… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
This paper initiates the study of “Cryptophasia in Hardware”–a phenomenon that allows
hardware circuits/devices with no pre-established secret keys to securely exchange secret …

A novel privacy preserving scheme for smart grid-based home area networks

W Ali, IU Din, A Almogren, BS Kim - sensors, 2022 - mdpi.com
Despite the benefits of smart grids, concerns about security and privacy arise when a large
number of heterogeneous devices communicate via a public network. A novel privacy …