A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices
نویسندگان
چکیده
PUFs, or physical unclonable functions, are hardware security primitives that can offer lightweight solutions for constrained devices through challenge-response authentication protocols. However, the PUF-based have been presented often lack features such as mutual message encryption, which could be vital many applications. Other protocols suffer from vulnerabilities to denial of service attacks make them impractical use. This work introduces a protocol uses secret pattern recognition and authenticated exchange on Internet Things. The utilizes several techniques introduce nonlinearity, it employ any strong PUF circuit soft model generated. process requires simple bitwise operations along with true random number generator (TRNG). By avoiding use cryptographic hash protocol's nature is preserved. proposed against modeling tested showcase its resilience. Similar investigated found some essential features.
منابع مشابه
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
We enroll more and more personal pervasive devices because these simplify our everyday lives. In order to verify the identity of these devices we use authentication protocols. Although simple authentication often suffices, users would like to remain anonymous during these authentications. Many privacy-preserving authentication protocols have been proposed that claim security and privacy. Howeve...
متن کاملPUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol
Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA lightweight secure data transmission protocol for resource constrained devices
In this paper we present a lightweight but robust security protocol based on the forward and backward property of RC4 stream cipher. The proposed protocol offers data confidentiality, data authentication, data integrity, and data freshness with less operation and low overhead. Also, it allows data packets to be received in any arbitrary order and achieves semantic security. Furthermore, it elim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3084903