Physically Unclonable Functions (PUFs) represent a promising security primitive due to their unclonability, uniqueness and tamper-evident properties, and have been recently exploited for device identification and authentication, and for secret key generation and storage purposes. In this paper, we present PHEMAP (Physical Hardware-Enabled Mutual Authentication Protocol), that allows to achieve mutual authentication in a one-to-many communication scenario, where multiple devices are connected to a sink node. The protocol exploits the recursive invocation of the PUF embedded on the devices to generate sequences (chains) of values that are used to achieve synchronization among communicating parties. We demonstrate that, under reasonable assump...
As security has always been an afterthought of innovation, the security of IoT (Internet of Things),...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
As embedded computers become ubiquitous, mobile and more integrated in connectivity, user dependence...
Physically Unclonable Functions (PUFs) represent a promising security primitive due to their unclona...
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HEL...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
In most PUF-based authentication schemes, a central server is usually engaged to verify the response...
Abstract. We demonstrate a prototype implementation of a provably secure protocol that supports priv...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
The desire to connect more and more devices and to make them more intelligent and more reliable, is ...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Trabajo presentado al ICM celebrado en El Cairo del 19 al 22 de diciembre de 2010.Security features ...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
As security has always been an afterthought of innovation, the security of IoT (Internet of Things),...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
As embedded computers become ubiquitous, mobile and more integrated in connectivity, user dependence...
Physically Unclonable Functions (PUFs) represent a promising security primitive due to their unclona...
This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HEL...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
In most PUF-based authentication schemes, a central server is usually engaged to verify the response...
Abstract. We demonstrate a prototype implementation of a provably secure protocol that supports priv...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
The desire to connect more and more devices and to make them more intelligent and more reliable, is ...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Trabajo presentado al ICM celebrado en El Cairo del 19 al 22 de diciembre de 2010.Security features ...
In the context of hardware systems, authentication refers to the process of confirming the identity ...
Physical systems are becoming increasingly computationally powerful as faster microprocessors are in...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
As security has always been an afterthought of innovation, the security of IoT (Internet of Things),...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
As embedded computers become ubiquitous, mobile and more integrated in connectivity, user dependence...