Aman et al., 2016 - Google Patents
Position paper: Physical unclonable functions for iot securityAman et al., 2016
View PDF- Document ID
- 6743425741317465074
- Author
- Aman M
- Chua K
- Sikdar B
- Publication year
- Publication venue
- Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and security
External Links
Snippet
Devices in the Internet of Things (IoT) introduce unique security challenges due to their operating conditions and device limitations. Existing security solutions based on classical cryptography have significant drawbacks in IoT devices, primarily due to the possibility of …
- 238000000034 method 0 description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aman et al. | Position paper: Physical unclonable functions for iot security | |
US10742421B1 (en) | Methods and systems for anonymous hardware attestation | |
Liang et al. | A double PUF-based RFID identity authentication protocol in service-centric internet of things environments | |
Liang et al. | A mutual security authentication method for RFID-PUF circuit based on deep learning | |
Patil et al. | Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts | |
Gao et al. | Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices | |
Schulz et al. | Short paper: Lightweight remote attestation using physical functions | |
Huang et al. | A PUF-based unified identity verification framework for secure IoT hardware via device authentication | |
Gope et al. | A privacy-aware reconfigurable authenticated key exchange scheme for secure communication in smart grids | |
Potkonjak et al. | Differential public physically unclonable functions: architecture and applications | |
Guin et al. | A secure low-cost edge device authentication scheme for the internet of things | |
Barbareschi et al. | A PUF-based hardware mutual authentication protocol | |
JP2014523192A (en) | Security by encryption using fuzzy authentication information in device and server communication | |
KR20180102627A (en) | Privacy-preserving, mutual PUF-based authentication protocols | |
Barbareschi et al. | Authenticating IoT devices with physically unclonable functions models | |
Zhao et al. | ePUF: A lightweight double identity verification in IoT | |
Liang et al. | Study on PUF based secure protection for IC design | |
Roy et al. | PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IOT | |
Lounis et al. | Lessons learned: Analysis of PUF-based authentication protocols for IoT | |
Das et al. | Securing iot-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme | |
Mispan et al. | Cost-efficient design for modeling attacks resistant PUFs | |
JP2018523439A (en) | Authentication system, authentication method, IP license system for hardware module | |
Panchal et al. | Designing secure and efficient biometric-based access mechanism for cloud services | |
Sami et al. | POCA: First power-on chip authentication in untrusted foundry and assembly | |
Tehranipoor et al. | Exploring methods of authentication for the internet of things |