×
Jul 1, 2024 · On the other hand, Physical Unclonable Functions are emerging as one of the most promising technologies to address security-related challenges.
Jul 4, 2024 · On the other hand, Physical Unclonable Functions are emerging as one of the most promising technologies to address security-related challenges.
ABSTRACT. With the rapid proliferation of Internet of Things systems, ensuring secure communication for those applications that need to exchange.
On the adoption of PUF for key agreement scheme in Internet of Things ; Barbareschi M., Casola V., Lombardi D. ; Adeli M., Bagheri N., Martín H., Peris-Lopez P.
People also ask
The proposed protocol guarantees the users privacy with a decentralized smart contract blockchain with the PUF model. In practice, the proposed protocol ...
Furthermore, we present the first PUF-based authentication scheme that addresses the potential temporal compromise of the Prover device and eliminates the need ...
Dec 7, 2023 · Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique ...
Feb 1, 2024 · Similarly, Gope and Sikdar [11] proposed a privacy-aware authentication and key agreement scheme for secure smart grid communication, using PUF, ...
Key agreement between two constrained IoT devices that have never met each other is an essential feature to provide in order to establish trust among its ...
Nov 9, 2021 · This paper proposes a lightweight authentication and key agreement protocol for UAV networks. PUF technology is introduced into the protocol, by ...