Cargando…
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a...
Autores principales: | Sun, Da-Zhi, Gao, Yi-Na, Tian, Yangguang |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10383870/ https://www.ncbi.nlm.nih.gov/pubmed/37514853 http://dx.doi.org/10.3390/s23146559 |
Ejemplares similares
-
PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices
por: Lee, JoonYoung, et al.
Publicado: (2022) -
Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices
por: Vinko, Davor, et al.
Publicado: (2023) -
Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs
por: Arcenegui, Javier, et al.
Publicado: (2021) -
Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices
por: Babaei, Armin, et al.
Publicado: (2022) -
Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE
por: Sousa, Patrícia R., et al.
Publicado: (2021)