Jul 20, 2023 · Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices.
Jul 20, 2023 · The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into ...
This work gives the first non-trivial concrete security analysis for the PUF protocol, and employs the automatic verification tool of security protocols, ...
This paper proposes two novel lightweight Mutual Authentication and Key Exchange Protocols (MAKEP) for IoT devices using PUF.
People also ask
What is the puf authentication protocol?
What is puf based authentication and key exchange for internet of things?
What is puf in IoT?
What is the primary benefit of using a controlled puf in a puf-based authentication protocol?
Jul 25, 2022 · Physical unclonable function (PUF) is a key enabler to lightweight, low-power and secure authentication of resource-constrained devices in IoT.
Nov 7, 2023 · PUF provides an unclonable and tamper sensitive unique signature based on the PUF chip by using manufacturing process variability. Therefore, in ...
Dec 7, 2023 · In summary, PUFs are a promising security primitive for IoT devices that can be used to enhance the security of authentication, key exchange, ...
May 1, 2018 · The security of the protocol is proved formally under the Session Key Security and the Universal Composability Framework. A prototype of the ...
Dec 13, 2019 · In this chapter we propose a very efficient method to provide authentication between two IoT devices using PUFs and a common trusted cluster node.
We have developed a lightweight identity-based cryptosystem suitable for IoT to enable secure authentication and message exchange among the devices.