This paper describes an offline authentication scheme for resource-constrained embedded devices designated for applications in the Internet of Things (IoT). The novelty of the work is the combination of SRAM based PUF structures and hash values of the bootloader to derive a device unique fingerprint. We propose the usage of asymmetric encryption to secure the communication path. On top of the description of the generic concepts, we also present alternative variations using additional components such as one-time programmable (OTP) memory. The schemes are thoroughly evaluated against a set of relevant attack scenarios
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
This paper presents a overview over research activities in the field of Physically Unclonable Functi...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Conventional cryptographic solutions to the security are expensive in terms of computing resources (...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as si...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
This paper presents a overview over research activities in the field of Physically Unclonable Functi...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Conventional cryptographic solutions to the security are expensive in terms of computing resources (...
Key agreement between two constrained Internet of Things (IoT) devices that have not met each other ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physical Unclonable Functions (PUFs) are circuits that exploit chip-unique features to be used as si...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification ...
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are i...