PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey

Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More s...

Full description

Saved in:
Bibliographic Details
Published inIEEE internet of things journal Vol. 9; no. 11; pp. 8205 - 8228
Main Authors Mall, Priyanka, Amin, Ruhul, Das, Ashok Kumar, Leung, Mark T., Choo, Kim-Kwang Raymond
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.06.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function, which maps inherent properties of the hardware devices to a unique bit stream of information. Authentication and key agreement (AKA) protocols are widely used in electronic commerce, electronic stock trading, and many secured business transaction platforms, because they allow the communicating devices to mutually authenticate each other while exchanging authenticated session key (or secret key) that can be used subsequently to establish a secured communication channel. Yet, these protocols are also vulnerable to a broad range of security outbreaks. In light of these notions and practical applications, this article is intended to: 1) provide an overview of AKA protocols, PUF plus the combined PUF-based AKA; 2) systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast growing areas of Internet of Things, wireless sensor networks, and smart grids based on a meticulous survey of the existing literature; 3) summarize the challenges to deployment and potential security risks of the underlying technologies and possible remedies or mitigation strategies; and 4) to conduct and report a comparative performance and security analysis with respect to the three focused areas.
AbstractList Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function, which maps inherent properties of the hardware devices to a unique bit stream of information. Authentication and key agreement (AKA) protocols are widely used in electronic commerce, electronic stock trading, and many secured business transaction platforms, because they allow the communicating devices to mutually authenticate each other while exchanging authenticated session key (or secret key) that can be used subsequently to establish a secured communication channel. Yet, these protocols are also vulnerable to a broad range of security outbreaks. In light of these notions and practical applications, this article is intended to: 1) provide an overview of AKA protocols, PUF plus the combined PUF-based AKA; 2) systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast growing areas of Internet of Things, wireless sensor networks, and smart grids based on a meticulous survey of the existing literature; 3) summarize the challenges to deployment and potential security risks of the underlying technologies and possible remedies or mitigation strategies; and 4) to conduct and report a comparative performance and security analysis with respect to the three focused areas.
Author Mall, Priyanka
Das, Ashok Kumar
Leung, Mark T.
Choo, Kim-Kwang Raymond
Amin, Ruhul
Author_xml – sequence: 1
  givenname: Priyanka
  surname: Mall
  fullname: Mall, Priyanka
  email: priyanka16101@iiitnr.edu.in
  organization: Department of Electronics and Communication Engineering, IIIT Naya Raipur, Chattisgarh, India
– sequence: 2
  givenname: Ruhul
  orcidid: 0000-0002-3592-9421
  surname: Amin
  fullname: Amin, Ruhul
  email: amin_ruhul@live.com
  organization: Department of Computer Science & Engineering, IIIT Naya Raipur, Chattisgarh, India
– sequence: 3
  givenname: Ashok Kumar
  surname: Das
  fullname: Das, Ashok Kumar
  email: ashok.das@iiit.ac.in
  organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India
– sequence: 4
  givenname: Mark T.
  surname: Leung
  fullname: Leung, Mark T.
  email: mark.leung@utsa.edu
  organization: Department of Management Science and Statistics, The University of Texas at San Antonio, San Antonio, TX, USA
– sequence: 5
  givenname: Kim-Kwang Raymond
  orcidid: 0000-0001-9208-5336
  surname: Choo
  fullname: Choo, Kim-Kwang Raymond
  email: raymond.choo@fulbrightmail.org
  organization: Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA
BookMark eNp9kE1LAzEQhoMoWKs_QLwEvLo1H7vZjbdatFbFFlrxuGSTWd3abmqSFfrv3bYi4sHTDMz7zDDPEdqvbQ0InVLSo5TIy_vReNZjhLEepzEjWbyHOoyzNIqFYPu_-kN04v2cENJiCZWig94nz7fRtfJgcL8Jb1CHSqtQ2Rqr2uAHWOP-qwNYtgM8cTZYbRcel9bhkZ1d4Jfpk7_YRqdL5QIeusr4K9zHA7tcOWj3-eoT8LRxn7A-RgelWng4-a5d9Hx7MxvcRY_j4WjQf4w0T2SIUiN1FhvJjCpNRplWScoTpVmhqZCJKHicSs1KSCQpEuApN2VsikwJo2MGhnfR-W7vytmPBnzI57ZxdXsyZ0JIKhLCZZuiu5R21nsHZb5yVfvEOqck32jNN1rzjdb8W2vLpH8YXYWtruBUtfiXPNuRFQD8XJIiTQnJ-BeP1YZe
CODEN IITJAU
CitedBy_id crossref_primary_10_1109_JIOT_2024_3359509
crossref_primary_10_1007_s11227_023_05437_3
crossref_primary_10_1007_s10207_022_00619_1
crossref_primary_10_1016_j_comnet_2023_109643
crossref_primary_10_1038_s41467_024_47479_y
crossref_primary_10_1016_j_cose_2024_104310
crossref_primary_10_1016_j_comnet_2023_109967
crossref_primary_10_1109_TDSC_2023_3239611
crossref_primary_10_3390_s24144621
crossref_primary_10_3389_fenrg_2023_1269059
crossref_primary_10_1109_JIOT_2024_3464100
crossref_primary_10_3390_app14083363
crossref_primary_10_1109_ACCESS_2024_3418995
crossref_primary_10_1109_TIFS_2024_3364370
crossref_primary_10_1016_j_jksuci_2023_101784
crossref_primary_10_1007_s11227_023_05616_2
crossref_primary_10_1016_j_vehcom_2024_100847
crossref_primary_10_1109_JIOT_2023_3270300
crossref_primary_10_3390_iot5010001
crossref_primary_10_1007_s11082_023_04640_z
crossref_primary_10_1109_TAES_2023_3307092
crossref_primary_10_1016_j_jnca_2023_103759
crossref_primary_10_1007_s11227_024_06661_1
crossref_primary_10_1016_j_adhoc_2023_103162
crossref_primary_10_1587_elex_19_20220415
crossref_primary_10_1371_journal_pone_0310094
crossref_primary_10_1016_j_comnet_2024_110391
crossref_primary_10_32604_cmc_2024_047625
crossref_primary_10_1109_OJCOMS_2023_3234338
crossref_primary_10_3390_drones8090472
crossref_primary_10_3390_electronics11203398
crossref_primary_10_1109_LNET_2023_3298775
crossref_primary_10_1016_j_cose_2024_103905
crossref_primary_10_1371_journal_pone_0296781
crossref_primary_10_1109_JIOT_2024_3457827
crossref_primary_10_1007_s42979_024_03565_y
crossref_primary_10_1016_j_comcom_2023_12_006
crossref_primary_10_1109_ACCESS_2023_3347808
crossref_primary_10_1109_JIOT_2023_3267657
crossref_primary_10_1109_JIOT_2024_3381379
crossref_primary_10_1002_spy2_268
crossref_primary_10_3390_electronics11182925
crossref_primary_10_1007_s12083_024_01839_z
crossref_primary_10_1109_OJCAS_2023_3253144
crossref_primary_10_3390_app14051700
crossref_primary_10_1109_JSEN_2022_3216824
crossref_primary_10_32604_cmc_2023_047084
crossref_primary_10_1038_s41598_023_48464_z
crossref_primary_10_1016_j_comcom_2024_02_001
crossref_primary_10_1109_MCE_2022_3226585
crossref_primary_10_1109_MCE_2023_3296222
crossref_primary_10_3390_math11081929
crossref_primary_10_1109_ACCESS_2023_3288696
crossref_primary_10_1016_j_iot_2023_100797
crossref_primary_10_1109_ACCESS_2024_3361921
crossref_primary_10_1109_JIOT_2022_3228921
crossref_primary_10_3390_electronics12071646
crossref_primary_10_1016_j_esr_2024_101299
crossref_primary_10_3233_JIFS_240099
crossref_primary_10_3390_mi15040552
crossref_primary_10_1007_s13369_024_08882_1
crossref_primary_10_3390_math12010077
crossref_primary_10_1109_TNSE_2024_3373386
crossref_primary_10_32604_iasc_2023_040502
crossref_primary_10_1016_j_sysarc_2024_103176
crossref_primary_10_1109_JIOT_2024_3431879
crossref_primary_10_1155_2022_4275243
crossref_primary_10_3390_cryptography8010007
crossref_primary_10_1007_s00607_023_01188_4
crossref_primary_10_3390_math11010048
crossref_primary_10_1109_TII_2023_3248107
Cites_doi 10.1016/j.jpdc.2018.04.007
10.1109/MCOM.2016.7470936
10.1109/ACCESS.2019.2926578
10.1109/TIE.2016.2585081
10.1016/j.jnca.2017.10.017
10.23919/ELINFOCOM.2019.8706400
10.1007/s11276-020-02491-0
10.1109/TII.2019.2936278
10.1109/ACCESS.2017.2676119
10.1016/j.future.2018.08.038
10.1007/978-3-642-15031-9_25
10.1007/s10207-019-00484-5
10.1109/JBHI.2017.2753464
10.1016/j.adhoc.2014.03.009
10.1109/MENACOMM46666.2019.8988545
10.1007/978-3-030-24907-6_3
10.1007/s00530-015-0476-3
10.1155/2015/721921
10.3390/s19132957
10.1109/ICC.2017.7996735
10.1002/dac.3195
10.1155/2019/5935292
10.1109/ICCSN.2019.8905295
10.1002/sec.1573
10.1016/j.compeleceng.2017.04.012
10.1007/978-1-4842-5860-6_8
10.1109/TENCON.2019.8929367
10.1109/ICOIN48656.2020.9016538
10.1109/WF-IoT.2016.7845456
10.1109/GLOCOM.2017.8253991
10.12928/telkomnika.v18i1.14798
10.1109/TCAD.2019.2962115
10.7873/DATE.2014.361
10.1016/j.smhl.2018.01.001
10.3390/en11102662
10.1016/j.ins.2019.06.047
10.1016/j.future.2016.12.028
10.1109/ACCESS.2019.2925106
10.1007/978-3-642-14452-3_1
10.1109/JSYST.2021.3101201
10.1002/9781119527978.ch10
10.3390/sym10080352
10.1016/j.dcan.2015.11.001
10.1016/j.future.2020.03.034
10.1016/j.future.2019.06.012
10.3390/electronics9091479
10.1109/TII.2019.2895030
10.1016/j.comcom.2020.11.009
10.1109/DESEC.2017.8073853
10.23919/ChiCC.2018.8482797
10.1109/WETICE.2019.00020
10.1016/j.procs.2020.03.185
10.1155/2014/415415
10.1080/02564602.2020.1726216
10.1109/ICCChina.2019.8855828
10.1007/s00530-013-0346-9
10.1016/j.jisa.2020.102729
10.1109/ICAEM.2018.8536295
10.2478/cait-2019-0002
10.1109/JPROC.2014.2320516
10.1016/j.heliyon.2019.e01591
10.1007/s10916-015-0307-2
10.1016/j.ins.2016.12.046
10.1007/s11277-020-07237-x
10.1109/TDSC.2018.2857811
10.1007/s12083-020-00911-8
10.1109/TDSC.2018.2832201
10.1186/s13677-015-0030-z
10.1109/JSYST.2018.2866067
10.3390/s16122123
10.1016/j.comcom.2019.12.042
10.1109/ACCESS.2020.3007623
10.1109/ICNSS.2011.6060013
10.1155/2017/5989151
10.1109/TSG.2019.2908698
10.1109/CCNC46108.2020.9045264
10.1109/JIOT.2019.2942271
10.1016/j.jnca.2017.07.001
10.1155/2018/5253840
10.1109/JIOT.2017.2780232
10.1109/MCOM.2017.1700451
10.1007/978-1-4614-3363-7_70
10.1109/ISCAS.2011.5938068
10.1109/TSG.2018.2844403
10.1109/JIOT.2020.2970974
10.1109/TWC.2015.2473165
10.1109/TIFS.2018.2832849
10.1007/s40860-019-00079-w
10.1016/j.comnet.2013.08.003
10.1109/TC.2009.109
10.1109/ACCESS.2019.2905347
10.1109/ISQED.2019.8697540
10.1016/j.jnca.2012.03.011
10.1109/COMST.2019.2907650
10.1007/978-3-642-33704-8_6
10.1007/s10776-018-0391-6
10.1109/JIOT.2018.2887086
10.1080/1206212X.2020.1825159
10.1109/ICDSP.2018.8631814
10.1007/978-3-642-41395-7
10.1007/978-3-642-04474-8_22
10.1109/JIOT.2018.2866623
10.1109/ACCESS.2019.2931472
10.1109/TIFS.2017.2659640
10.1007/s10916-017-0720-9
10.1016/j.cose.2020.101958
10.1007/978-3-319-53177-9_2
10.1109/TVT.2020.2976960
10.1016/j.jisa.2020.102585
10.1109/JSEN.2020.3028872
10.1109/JIOT.2019.2939286
10.1109/MVT.2018.2881228
10.1155/2014/347169
10.1145/3005715
10.1109/JIOT.2017.2703088
10.1007/s11227-019-03003-4
10.1016/j.jnca.2016.10.001
10.1016/j.comnet.2018.11.016
10.1109/HST.2018.8383916
10.1109/JIOT.2018.2877690
10.1007/s11277-020-07153-0
10.1109/HST.2011.5955011
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/JIOT.2022.3142084
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2327-4662
EndPage 8228
ExternalDocumentID 10_1109_JIOT_2022_3142084
9677008
Genre orig-research
GroupedDBID 0R~
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c359t-7d9c84d92dafd812ca5735ac2bc16956b3479c2fe590b5e373df4db8a6dc42ed3
IEDL.DBID RIE
ISSN 2327-4662
IngestDate Mon Jun 30 05:09:35 EDT 2025
Tue Jul 01 04:08:17 EDT 2025
Thu Apr 24 23:00:49 EDT 2025
Wed Aug 27 02:36:18 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 11
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c359t-7d9c84d92dafd812ca5735ac2bc16956b3479c2fe590b5e373df4db8a6dc42ed3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3592-9421
0000-0001-9208-5336
PQID 2669165039
PQPubID 2040421
PageCount 24
ParticipantIDs proquest_journals_2669165039
ieee_primary_9677008
crossref_primary_10_1109_JIOT_2022_3142084
crossref_citationtrail_10_1109_JIOT_2022_3142084
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE internet of things journal
PublicationTitleAbbrev JIoT
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref56
ref59
ref58
ref53
ref52
ref55
ref54
Rostami (ref31) 2017
ref51
ref50
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref9
ref4
ref3
ref6
ref5
ref100
ref101
ref40
ref35
ref34
ref37
ref36
ref30
ref33
(ref114) 2020
ref32
ref39
ref38
Li (ref65) 2019; 21
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref13
ref12
ref15
ref14
ref97
ref126
ref96
ref127
ref11
ref99
ref124
ref10
ref98
ref125
ref17
ref16
ref19
ref18
ref93
ref92
ref95
ref94
ref91
ref90
ref89
ref86
ref85
ref88
ref87
O’Donnell (ref1) 2004
ref82
ref81
ref84
ref83
ref80
ref79
ref108
ref78
ref109
ref106
ref107
ref75
ref104
ref74
ref105
ref77
ref102
ref76
ref103
ref2
Akhundov (ref7) 2020
ref71
ref111
ref70
ref112
ref73
ref72
ref110
ref68
ref119
ref67
ref117
ref69
ref118
ref64
ref115
ref63
ref116
ref66
ref113
ref60
ref122
ref123
ref62
ref120
ref61
ref121
References_xml – ident: ref47
  doi: 10.1016/j.jpdc.2018.04.007
– ident: ref77
  doi: 10.1109/MCOM.2016.7470936
– ident: ref112
  doi: 10.1109/ACCESS.2019.2926578
– ident: ref54
  doi: 10.1109/TIE.2016.2585081
– ident: ref72
  doi: 10.1016/j.jnca.2017.10.017
– ident: ref16
  doi: 10.23919/ELINFOCOM.2019.8706400
– ident: ref38
  doi: 10.1007/s11276-020-02491-0
– ident: ref62
  doi: 10.1109/TII.2019.2936278
– ident: ref43
  doi: 10.1109/ACCESS.2017.2676119
– ident: ref44
  doi: 10.1016/j.future.2018.08.038
– ident: ref126
  doi: 10.1007/978-3-642-15031-9_25
– ident: ref19
  doi: 10.1007/s10207-019-00484-5
– ident: ref26
  doi: 10.1109/JBHI.2017.2753464
– ident: ref55
  doi: 10.1016/j.adhoc.2014.03.009
– ident: ref3
  doi: 10.1109/MENACOMM46666.2019.8988545
– ident: ref119
  doi: 10.1007/978-3-030-24907-6_3
– ident: ref56
  doi: 10.1007/s00530-015-0476-3
– ident: ref66
  doi: 10.1155/2015/721921
– ident: ref64
  doi: 10.3390/s19132957
– ident: ref53
  doi: 10.1109/ICC.2017.7996735
– ident: ref107
  doi: 10.1002/dac.3195
– ident: ref79
  doi: 10.1155/2019/5935292
– ident: ref14
  doi: 10.1109/ICCSN.2019.8905295
– ident: ref87
  doi: 10.1002/sec.1573
– ident: ref69
  doi: 10.1016/j.compeleceng.2017.04.012
– ident: ref115
  doi: 10.1007/978-1-4842-5860-6_8
– ident: ref106
  doi: 10.1109/TENCON.2019.8929367
– ident: ref8
  doi: 10.1109/ICOIN48656.2020.9016538
– ident: ref35
  doi: 10.1109/WF-IoT.2016.7845456
– ident: ref68
  doi: 10.1109/GLOCOM.2017.8253991
– volume-title: PUF authentication and key-exchange by substring matching
  year: 2017
  ident: ref31
– ident: ref105
  doi: 10.12928/telkomnika.v18i1.14798
– ident: ref118
  doi: 10.1109/TCAD.2019.2962115
– ident: ref117
  doi: 10.7873/DATE.2014.361
– ident: ref92
  doi: 10.1016/j.smhl.2018.01.001
– ident: ref108
  doi: 10.3390/en11102662
– ident: ref18
  doi: 10.1016/j.ins.2019.06.047
– ident: ref84
  doi: 10.1016/j.future.2016.12.028
– ident: ref4
  doi: 10.1109/ACCESS.2019.2925106
– ident: ref2
  doi: 10.1007/978-3-642-14452-3_1
– ident: ref116
  doi: 10.1109/JSYST.2021.3101201
– ident: ref5
  doi: 10.1002/9781119527978.ch10
– ident: ref23
  doi: 10.3390/sym10080352
– ident: ref60
  doi: 10.1016/j.dcan.2015.11.001
– ident: ref6
  doi: 10.1016/j.future.2020.03.034
– ident: ref13
  doi: 10.1016/j.future.2019.06.012
– ident: ref111
  doi: 10.3390/electronics9091479
– ident: ref49
  doi: 10.1109/TII.2019.2895030
– ident: ref39
  doi: 10.1016/j.comcom.2020.11.009
– volume-title: PUF-Based Random Number Generation
  year: 2004
  ident: ref1
– ident: ref32
  doi: 10.1109/DESEC.2017.8073853
– ident: ref94
  doi: 10.23919/ChiCC.2018.8482797
– ident: ref17
  doi: 10.1109/WETICE.2019.00020
– ident: ref71
  doi: 10.1016/j.procs.2020.03.185
– year: 2020
  ident: ref7
  article-title: Public-key based authentication architecture for IoT devices using PUF
  publication-title: arXiv:2002.01277
– ident: ref96
  doi: 10.1155/2014/415415
– ident: ref10
  doi: 10.1080/02564602.2020.1726216
– ident: ref15
  doi: 10.1109/ICCChina.2019.8855828
– volume: 21
  start-page: 618
  issue: 4
  year: 2019
  ident: ref65
  article-title: A PUF-based group key transfer protocol for Bluetooth
  publication-title: Int. J. Netw. Security
– ident: ref57
  doi: 10.1007/s00530-013-0346-9
– ident: ref76
  doi: 10.1016/j.jisa.2020.102729
– ident: ref25
  doi: 10.1109/ICAEM.2018.8536295
– ident: ref109
  doi: 10.2478/cait-2019-0002
– ident: ref86
  doi: 10.1109/JPROC.2014.2320516
– ident: ref99
  doi: 10.1016/j.heliyon.2019.e01591
– ident: ref83
  doi: 10.1007/s10916-015-0307-2
– ident: ref50
  doi: 10.1016/j.ins.2016.12.046
– ident: ref52
  doi: 10.1007/s11277-020-07237-x
– ident: ref113
  doi: 10.1109/TDSC.2018.2857811
– ident: ref102
  doi: 10.1007/s12083-020-00911-8
– ident: ref22
  doi: 10.1109/TDSC.2018.2832201
– ident: ref89
  doi: 10.1186/s13677-015-0030-z
– ident: ref81
  doi: 10.1109/JSYST.2018.2866067
– ident: ref82
  doi: 10.3390/s16122123
– ident: ref104
  doi: 10.1016/j.comcom.2019.12.042
– ident: ref103
  doi: 10.1109/ACCESS.2020.3007623
– ident: ref124
  doi: 10.1109/ICNSS.2011.6060013
– ident: ref91
  doi: 10.1155/2017/5989151
– ident: ref110
  doi: 10.1109/TSG.2019.2908698
– ident: ref36
  doi: 10.1109/CCNC46108.2020.9045264
– ident: ref20
  doi: 10.1109/JIOT.2019.2942271
– ident: ref42
  doi: 10.1016/j.jnca.2017.07.001
– ident: ref75
  doi: 10.1155/2018/5253840
– ident: ref78
  doi: 10.1109/JIOT.2017.2780232
– ident: ref67
  doi: 10.1109/MCOM.2017.1700451
– ident: ref95
  doi: 10.1007/978-1-4614-3363-7_70
– ident: ref123
  doi: 10.1109/ISCAS.2011.5938068
– ident: ref101
  doi: 10.1109/TSG.2018.2844403
– ident: ref9
  doi: 10.1109/JIOT.2020.2970974
– ident: ref88
  doi: 10.1109/TWC.2015.2473165
– ident: ref34
  doi: 10.1109/TIFS.2018.2832849
– ident: ref21
  doi: 10.1007/s40860-019-00079-w
– ident: ref120
  doi: 10.1016/j.comnet.2013.08.003
– ident: ref97
  doi: 10.1109/TC.2009.109
– ident: ref74
  doi: 10.1109/ACCESS.2019.2905347
– ident: ref12
  doi: 10.1109/ISQED.2019.8697540
– ident: ref80
  doi: 10.1016/j.jnca.2012.03.011
– ident: ref100
  doi: 10.1109/COMST.2019.2907650
– ident: ref121
  doi: 10.1007/978-3-642-33704-8_6
– ident: ref93
  doi: 10.1007/s10776-018-0391-6
– ident: ref73
  doi: 10.1109/JIOT.2018.2887086
– ident: ref51
  doi: 10.1080/1206212X.2020.1825159
– ident: ref24
  doi: 10.1109/ICDSP.2018.8631814
– ident: ref122
  doi: 10.1007/978-3-642-41395-7
– ident: ref48
  doi: 10.1007/978-3-642-04474-8_22
– ident: ref29
  doi: 10.1109/JIOT.2018.2866623
– ident: ref85
  doi: 10.1109/ACCESS.2019.2931472
– ident: ref27
  doi: 10.1109/TIFS.2017.2659640
– ident: ref59
  doi: 10.1007/s10916-017-0720-9
– ident: ref63
  doi: 10.1016/j.cose.2020.101958
– ident: ref33
  doi: 10.1007/978-3-319-53177-9_2
– ident: ref11
  doi: 10.1109/TVT.2020.2976960
– ident: ref37
  doi: 10.1016/j.jisa.2020.102585
– ident: ref45
  doi: 10.1109/JSEN.2020.3028872
– ident: ref46
  doi: 10.1109/JIOT.2019.2939286
– ident: ref98
  doi: 10.1109/MVT.2018.2881228
– ident: ref58
  doi: 10.1155/2014/347169
– ident: ref30
  doi: 10.1145/3005715
– ident: ref70
  doi: 10.1109/JIOT.2017.2703088
– ident: ref40
  doi: 10.1007/s11227-019-03003-4
– ident: ref90
  doi: 10.1016/j.jnca.2016.10.001
– ident: ref61
  doi: 10.1016/j.comnet.2018.11.016
– ident: ref127
  doi: 10.1109/HST.2018.8383916
– ident: ref28
  doi: 10.1109/JIOT.2018.2877690
– volume-title: MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library.
  year: 2020
  ident: ref114
– ident: ref41
  doi: 10.1007/s11277-020-07153-0
– ident: ref125
  doi: 10.1109/HST.2011.5955011
SSID ssj0001105196
Score 2.5654073
Snippet Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 8205
SubjectTerms Authentication
Authentication and key agreement (AKA)
Communication
Cryptography
Internet of Things
Mathematical models
physically unclonable function (PUF)
Protocols
Smart grid
Smart grids
Wireless sensor networks
wireless sensor networks (WSNs)
Title PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
URI https://ieeexplore.ieee.org/document/9677008
https://www.proquest.com/docview/2669165039
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwELYoJy7QllbdQpEPnNBmceI4sbltK7Y8xEPaXcEtiu2JQFs2VTaLRH99x052EQ8hbjmME0vfOPPNeB6E7ApgYSFiHVieqyAuNATIWsNAGmYk5zYv_Digs_PkaByfXIvrFdJd1sIAgE8-g5579Hf5tjRzFyrbV0ma-sreD-i4NbVaj_GU0JGRpL24DJnaPzm-GKEDGEXol7pL5PiJ6fGzVF78gL1VGWyQs8V-mmSSSW9e657596xV43s3_JGst_SS9ht9-ERWYPqZbCxGN9D2JG-SyeV4EPxEC2apC5K5lKEmdkfzqaWn8ED76Ij70CG9rMq6RH2ZUSS49LgcdenV8HzW9aLDO9Q9-ru6tbMD2qfuSxXcNFnxdDiv7uHhCxkPDke_joJ27kJguFB1kFplZGxVhEhZJAAmFykXuYm0CRP0p7SrPjVRAUIxLYCn3Bax1TJPrIkjsPwrWZ2WU_hGKNM5D4tCgtFIdAzSSSnSEISQTAKzskPYApLMtE3J3WyMP5l3TpjKHIqZQzFrUeyQveWSv01HjreENx0qS8EWkA7ZXuCetWd2liFVQa4sGFffX1-1Rdbcu5tEsW2yWldz-IGUpNY7Xhf_A1Wv3jI
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Nb9MwFLemcWAXBmyIssF84ISazonjxOZWEKXd1m5SW223KLZftGmjmdIUafz1PDtpJz6EuOXwLFv6Pef93vP7IOS9ABYWItaB5bkK4kJDgKw1DKRhRnJu88KPAxpPkuE8PrkSV1uku6mFAQCffAY99-nf8m1pVi5UdqySNPWVvU_Q7ouwqdZ6jKiEjo4k7dNlyNTxyeh8hi5gFKFn6p6R41-Mj5-m8scv2NuVwS4Zr0_UpJPc9la17pkfvzVr_N8jPyfPWoJJ-41GvCBbsHhJdtfDG2h7l_fI7cV8EHxCG2apC5O5pKEmekfzhaWn8ED76Ir74CG9qMq6RI1ZUqS4dFTOuvRyOll2vej0G2of_Vrd2OVH2qdupwqum7x4Ol1V3-Fhn8wHX2afh0E7eSEwXKg6SK0yMrYqQqwsUgCTi5SL3ETahAl6VNrVn5qoAKGYFsBTbovYapkn1sQRWP6KbC_KBbwmlOmch0UhwWikOgYJpRRpCEJIJoFZ2SFsDUlm2rbkbjrGXebdE6Yyh2LmUMxaFDvkw2bJfdOT41_Cew6VjWALSIccrnHP2lu7zJCsIFsWjKs3f191RJ4OZ-Oz7Gw0OT0gO26fJm3skGzX1QreIkGp9Tuvlz8BFIvhew
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PUF-Based+Authentication+and+Key+Agreement+Protocols+for+IoT%2C+WSNs%2C+and+Smart+Grids%3A+A+Comprehensive+Survey&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Mall%2C+Priyanka&rft.au=Amin%2C+Ruhul&rft.au=Das%2C+Ashok+Kumar&rft.au=Leung%2C+Mark+T.&rft.date=2022-06-01&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=9&rft.issue=11&rft.spage=8205&rft.epage=8228&rft_id=info:doi/10.1109%2FJIOT.2022.3142084&rft.externalDocID=9677008
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon