[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Aman et al., 2016 - Google Patents

Position paper: Physical unclonable functions for iot security

Aman et al., 2016

View PDF
Document ID
6743425741317465074
Author
Aman M
Chua K
Sikdar B
Publication year
Publication venue
Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and security

External Links

Snippet

Devices in the Internet of Things (IoT) introduce unique security challenges due to their operating conditions and device limitations. Existing security solutions based on classical cryptography have significant drawbacks in IoT devices, primarily due to the possibility of …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys

Similar Documents

Publication Publication Date Title
Aman et al. Position paper: Physical unclonable functions for iot security
US10742421B1 (en) Methods and systems for anonymous hardware attestation
Liang et al. A double PUF-based RFID identity authentication protocol in service-centric internet of things environments
Liang et al. A mutual security authentication method for RFID-PUF circuit based on deep learning
Patil et al. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
Gao et al. Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices
Schulz et al. Short paper: Lightweight remote attestation using physical functions
Huang et al. A PUF-based unified identity verification framework for secure IoT hardware via device authentication
Gope et al. A privacy-aware reconfigurable authenticated key exchange scheme for secure communication in smart grids
Potkonjak et al. Differential public physically unclonable functions: architecture and applications
Guin et al. A secure low-cost edge device authentication scheme for the internet of things
Barbareschi et al. A PUF-based hardware mutual authentication protocol
JP2014523192A (en) Security by encryption using fuzzy authentication information in device and server communication
KR20180102627A (en) Privacy-preserving, mutual PUF-based authentication protocols
Barbareschi et al. Authenticating IoT devices with physically unclonable functions models
Zhao et al. ePUF: A lightweight double identity verification in IoT
Liang et al. Study on PUF based secure protection for IC design
Roy et al. PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IOT
Lounis et al. Lessons learned: Analysis of PUF-based authentication protocols for IoT
Das et al. Securing iot-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme
Mispan et al. Cost-efficient design for modeling attacks resistant PUFs
JP2018523439A (en) Authentication system, authentication method, IP license system for hardware module
Panchal et al. Designing secure and efficient biometric-based access mechanism for cloud services
Sami et al. POCA: First power-on chip authentication in untrusted foundry and assembly
Tehranipoor et al. Exploring methods of authentication for the internet of things