4.7 Article

A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

LiKe: Lightweight Certificateless Key Agreement for Secure IoT Communications

Pietro Tedeschi et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

Underwater Internet of Things in Smart Ocean: System Architecture and Open Issues

Tie Qiu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)

Badis Hammi et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Urbi Chatterjee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

Prosanta Gope et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Efficient Fuzzy Extractors Based on Ternary Debiasing Method for Biased Physically Unclonable Functions

Manami Suzuki et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2019)

Article Automation & Control Systems

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Hardware & Architecture

Smart Healthcare in the Era of Internet-of-Things

Hongxu Zhu et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2019)

Article Engineering, Multidisciplinary

Design of an Industrial IoT-Based Monitoring System for Power Substations

Long Zhao et al.

IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2019)

Article Computer Science, Information Systems

Efficient and Secure Pairing-Free Certificateless Aggregate Signature Scheme for Healthcare Wireless Medical Sensor Networks

N. B. Gayathri et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Data Provenance for IoT With Light Weight Authentication and Privacy Preservation

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things

Zisang Xu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

Ashok Kumar Das et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions

Jin Wook Byun

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags

King-Hang Wang et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Information Systems

Evaluating Critical Security Issues of the IoT World: Present and Future Challenges

Mario Frustaci et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

Prosanta Gope et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Security and trust issues in Fog computing: A survey

PeiYun Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Editorial Material Computer Science, Theory & Methods

Internet of Things security and forensics: Challenges and opportunities

Mauro Conti et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF

Cedric Marchand et al.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2018)

Article Automation & Control Systems

Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments

Arijit Karati et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions

Prosanta Gope et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Jian Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

Xiong Li et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Multidisciplinary Sciences

PUF Based Authentication Protocol for IoT

An Braeken

SYMMETRY-BASEL (2018)

Article Computer Science, Information Systems

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks

Jangirala Srinivas et al.

AD HOC NETWORKS (2017)

Article Computer Science, Hardware & Architecture

Lightweight Mutual Authentication for IoT and Its Applications

Nan Li et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2017)

Article Computer Science, Hardware & Architecture

A PUF-Based Secure Communication Protocol for IoT

Urbi Chatterjee et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2017)

Article Engineering, Electrical & Electronic

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Chin-Chen Chang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Physical Unclonable Functions and Applications: A Tutorial

Charles Herder et al.

PROCEEDINGS OF THE IEEE (2014)

Article Computer Science, Information Systems

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wenbo Shi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Engineering, Electrical & Electronic

A Lightweight Message Authentication Scheme for Smart Grid Communications

Mostafa M. Fouda et al.

IEEE TRANSACTIONS ON SMART GRID (2011)

Article Engineering, Electrical & Electronic

A Note on Leakage-Resilient Authenticated Key Exchange

Ji Young Chun et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Theory & Methods

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Yevgeniy Dodis et al.

SIAM JOURNAL ON COMPUTING (2008)

Article Multidisciplinary Sciences

Physical one-way functions

R Pappu et al.

SCIENCE (2002)