Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
Radio Frequency Identification (RFID) enables RFID readers to perform fully automatic wireless ident...
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constr...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Security is becoming an increasing concern in electronic devices recently. Specifically, since the e...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals ...
The rapid evolution of IoT devices has revolutionized the IT field, where automation has been given ...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
Radio Frequency Identification (RFID) enables RFID readers to perform fully automatic wireless ident...
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constr...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Security is becoming an increasing concern in electronic devices recently. Specifically, since the e...
Physically unclonable functions (PUFs) are an emerging technology and have been proposed as central ...
Physical Unclonable Functions (PUFs) are a promis- ing technology to secure low-cost devices. A PUF ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals ...
The rapid evolution of IoT devices has revolutionized the IT field, where automation has been given ...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
Radio Frequency Identification (RFID) enables RFID readers to perform fully automatic wireless ident...
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constr...