Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
by
Sun, Da-Zhi
, Tian, Yangguang
, Gao, Yi-Na
in
Algorithms
/ authentication
/ Authentication protocols
/ Communication
/ Design
/ Field programmable gate arrays
/ impersonation
/ insider attack
/ Internet of Things
/ Investment analysis
/ key exchange
/ physically unclonable function
/ Protocol
/ Safety and security measures
/ surveillance
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
by
Sun, Da-Zhi
, Tian, Yangguang
, Gao, Yi-Na
in
Algorithms
/ authentication
/ Authentication protocols
/ Communication
/ Design
/ Field programmable gate arrays
/ impersonation
/ insider attack
/ Internet of Things
/ Investment analysis
/ key exchange
/ physically unclonable function
/ Protocol
/ Safety and security measures
/ surveillance
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
by
Sun, Da-Zhi
, Tian, Yangguang
, Gao, Yi-Na
in
Algorithms
/ authentication
/ Authentication protocols
/ Communication
/ Design
/ Field programmable gate arrays
/ impersonation
/ insider attack
/ Internet of Things
/ Investment analysis
/ key exchange
/ physically unclonable function
/ Protocol
/ Safety and security measures
/ surveillance
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
Journal Article
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in both N2N authentication and N2S authentication. (2) A legitimate but malicious IoT node is able to impersonate a target IoT node to cheat the server and any other IoT nodes in N2N authentication and the server in N2S authentication, respectively. (3) A legitimate but malicious IoT node can masquerade as the server to cheat any other target IoT nodes in both N2N authentication and N2S authentication. To the best of our knowledge, our work gives the first non-trivial concrete security analysis for the PUF protocol. In addition, we employ the automatic verification tool of security protocols, i.e., Scyther, to confirm the weaknesses found in the PUF protocol. We finally consider how to prevent weaknesses in the PUF protocol.
Publisher
MDPI AG,MDPI
Subject
This website uses cookies to ensure you get the best experience on our website.