A modeling attack resistant deception technique for securing lightweight-PUF based authentication
Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution for low-cost device authentication. Due to practical constraints in preventing phishing through public network or insecure communication channels, simple PUF-based authentication protocol with unrestricted que...
Saved in:
Main Authors: | Gu, Chongyan, Chang, Chip Hong, Liu, Weiqiang, Yu, Shichao, Wang, Yale, O’Neill, Máire |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/152417 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications
by: Zheng, Yue, et al.
Published: (2022) -
Vulnerability analysis of EMAP: An efficient RFID mutual authentication protocol
by: LI, Tieyan, et al.
Published: (2007) -
Securing IoT monitoring device using PUF and physical layer authentication
by: Zheng, Yue, et al.
Published: (2018) -
Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs
by: Delvaux, Jeroen
Published: (2020) -
Replay tolerance of authentication protocols
by: Lam, K.-Y.
Published: (2014)