Key agreement between two constrained Internet of Things (IoT) devices that have not met each other is an essential feature to provide in order to establish trust among its users. Physical Unclonable Functions (PUFs) on a device represent a low cost primitive exploiting the unique random patterns in the device and have been already applied in a multitude of applications for secure key generation and key agreement in order to avoid an attacker to take over the identity of a tampered device, whose key material has been extracted. This paper shows that the key agreement scheme of a recently proposed PUF based protocol, presented by Chatterjee et al., for Internet of Things (IoT) is vulnerable for man-in-the-middle, impersonation, and replay at...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
In IoT-based environments, smart services can be provided to users under various environments, such ...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
As security has always been an afterthought of innovation, the security of IoT (Internet of Things),...
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
The desire to connect more and more devices and to make them more intelligent and more reliable, is ...
The Internet of Things (IoT) has become an important technology which permits different devices and ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and aut...
Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Interne...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
In IoT-based environments, smart services can be provided to users under various environments, such ...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
As security has always been an afterthought of innovation, the security of IoT (Internet of Things),...
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
The desire to connect more and more devices and to make them more intelligent and more reliable, is ...
The Internet of Things (IoT) has become an important technology which permits different devices and ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which de...
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and aut...
Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Interne...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
In IoT-based environments, smart services can be provided to users under various environments, such ...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...