Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs). In traditional authentication protocols a user presents a set of credentials with an accompanying proof such as password or digital certificate. However, IoTs need more evolved methods as these classical techniques suffer from the pressing problems of password dependency and inability to bind access requests to the “things” from which they originate. Additionally, the protocols need to be lightweight and heterogeneous. Although PUFs seem promising to develop such mechanism, it puts forward an open problem of how to develop such mechanism without needing to store the se...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Ph. D. ThesisThe rise of the Internet of Things (IoT) creates a tendency to construct unified archit...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT device...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
No two physical objects are exactly the same, even when manufactured with a nominally identical proc...
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security d...
Ph. D. ThesisThe rise of the Internet of Things (IoT) creates a tendency to construct unified archit...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...