Device authentication is an essential security feature for the Internet of Things (IoT). Physical unclonable functions (PUFs) are a promising technology for developing lightweight authentication protocols in these environments. This article presents the current progress and challenges in designing PUF-based authentication protocols for IoT devices
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Al...
Recent fourth industrial revolution, industry4.0 results in lot of automation of industrial processe...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
<p>In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed.&...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end-to-end a...
This paper presents a overview over research activities in the field of Physically Unclonable Functi...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Al...
Recent fourth industrial revolution, industry4.0 results in lot of automation of industrial processe...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
<p>In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed.&...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end-to-end a...
This paper presents a overview over research activities in the field of Physically Unclonable Functi...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
The last few decades have seen a large proliferation in the prevalence of cyber-physical systems. Al...
Recent fourth industrial revolution, industry4.0 results in lot of automation of industrial processe...