On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices

Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a...

Descripción completa

Detalles Bibliográficos
Autores principales: Sun, Da-Zhi, Gao, Yi-Na, Tian, Yangguang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10383870/
https://www.ncbi.nlm.nih.gov/pubmed/37514853
http://dx.doi.org/10.3390/s23146559