PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

[HTML][HTML] Hardware security in IoT devices with emphasis on hardware trojans

S Sidhu, BJ Mohd, T Hayajneh - Journal of Sensor and Actuator Networks, 2019 - mdpi.com
Security of IoT devices is getting a lot of attention from researchers as they are becoming
prevalent everywhere. However, implementation of hardware security in these devices has …

A PUF-based modeling-attack resilient authentication protocol for IoT devices

M Ebrahimabadi, M Younis… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) offer a promising solution for the authentication of
Internet of Things (IoT) devices as they provide unique fingerprints for the underlying …

Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment

C Tian, Q Jiang, T Li, J Zhang, N Xi, J Ma - Computer Networks, 2022 - Elsevier
With the widespread application of unmanned aerial vehicles (UAVs), the discussion about
the various security and privacy issues of UAVs have never stopped. Physical Unclonable …

T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT

K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …

D2D-MAP: A drone to drone authentication protocol using physical unclonable functions

K Lounis, SHH Ding… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …

A PUF-based mutual authentication scheme for cloud-edges IoT systems

M Barbareschi, A De Benedictis, E La Montagna… - Future Generation …, 2019 - Elsevier
With the exponential growth of generated and processed Internet of Things (IoT) data, the
Cloud-Edges (CE) paradigm, which distributes part of the intelligence and computation …

A comprehensive survey of hardware-assisted security: From the edge to the cloud

L Coppolino, S D'Antonio, G Mazzeo, L Romano - Internet of Things, 2019 - Elsevier
Sensitive data processing occurs more and more on machines or devices out of users
control. In the Internet of Things world, for example, the security of data could be posed at …

Device-specific security challenges and solution in IoT edge computing: a review

A Roy, J Kokila, N Ramasubramanian… - The Journal of …, 2023 - Springer
Rapid growth in IoT technology demands the need for the emergence of new IoT devices.
IoT devices vary in terms of shape, size, storage, battery life, and computational power …