PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More s...
Saved in:
Published in | IEEE internet of things journal Vol. 9; no. 11; pp. 8205 - 8228 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.06.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function, which maps inherent properties of the hardware devices to a unique bit stream of information. Authentication and key agreement (AKA) protocols are widely used in electronic commerce, electronic stock trading, and many secured business transaction platforms, because they allow the communicating devices to mutually authenticate each other while exchanging authenticated session key (or secret key) that can be used subsequently to establish a secured communication channel. Yet, these protocols are also vulnerable to a broad range of security outbreaks. In light of these notions and practical applications, this article is intended to: 1) provide an overview of AKA protocols, PUF plus the combined PUF-based AKA; 2) systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast growing areas of Internet of Things, wireless sensor networks, and smart grids based on a meticulous survey of the existing literature; 3) summarize the challenges to deployment and potential security risks of the underlying technologies and possible remedies or mitigation strategies; and 4) to conduct and report a comparative performance and security analysis with respect to the three focused areas. |
---|---|
AbstractList | Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function, which maps inherent properties of the hardware devices to a unique bit stream of information. Authentication and key agreement (AKA) protocols are widely used in electronic commerce, electronic stock trading, and many secured business transaction platforms, because they allow the communicating devices to mutually authenticate each other while exchanging authenticated session key (or secret key) that can be used subsequently to establish a secured communication channel. Yet, these protocols are also vulnerable to a broad range of security outbreaks. In light of these notions and practical applications, this article is intended to: 1) provide an overview of AKA protocols, PUF plus the combined PUF-based AKA; 2) systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast growing areas of Internet of Things, wireless sensor networks, and smart grids based on a meticulous survey of the existing literature; 3) summarize the challenges to deployment and potential security risks of the underlying technologies and possible remedies or mitigation strategies; and 4) to conduct and report a comparative performance and security analysis with respect to the three focused areas. |
Author | Mall, Priyanka Das, Ashok Kumar Leung, Mark T. Choo, Kim-Kwang Raymond Amin, Ruhul |
Author_xml | – sequence: 1 givenname: Priyanka surname: Mall fullname: Mall, Priyanka email: priyanka16101@iiitnr.edu.in organization: Department of Electronics and Communication Engineering, IIIT Naya Raipur, Chattisgarh, India – sequence: 2 givenname: Ruhul orcidid: 0000-0002-3592-9421 surname: Amin fullname: Amin, Ruhul email: amin_ruhul@live.com organization: Department of Computer Science & Engineering, IIIT Naya Raipur, Chattisgarh, India – sequence: 3 givenname: Ashok Kumar surname: Das fullname: Das, Ashok Kumar email: ashok.das@iiit.ac.in organization: Center for Security, Theory and Algorithmic Research, International Institute of Information Technology Hyderabad, Hyderabad, India – sequence: 4 givenname: Mark T. surname: Leung fullname: Leung, Mark T. email: mark.leung@utsa.edu organization: Department of Management Science and Statistics, The University of Texas at San Antonio, San Antonio, TX, USA – sequence: 5 givenname: Kim-Kwang Raymond orcidid: 0000-0001-9208-5336 surname: Choo fullname: Choo, Kim-Kwang Raymond email: raymond.choo@fulbrightmail.org organization: Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA |
BookMark | eNp9kE1LAzEQhoMoWKs_QLwEvLo1H7vZjbdatFbFFlrxuGSTWd3abmqSFfrv3bYi4sHTDMz7zDDPEdqvbQ0InVLSo5TIy_vReNZjhLEepzEjWbyHOoyzNIqFYPu_-kN04v2cENJiCZWig94nz7fRtfJgcL8Jb1CHSqtQ2Rqr2uAHWOP-qwNYtgM8cTZYbRcel9bhkZ1d4Jfpk7_YRqdL5QIeusr4K9zHA7tcOWj3-eoT8LRxn7A-RgelWng4-a5d9Hx7MxvcRY_j4WjQf4w0T2SIUiN1FhvJjCpNRplWScoTpVmhqZCJKHicSs1KSCQpEuApN2VsikwJo2MGhnfR-W7vytmPBnzI57ZxdXsyZ0JIKhLCZZuiu5R21nsHZb5yVfvEOqck32jNN1rzjdb8W2vLpH8YXYWtruBUtfiXPNuRFQD8XJIiTQnJ-BeP1YZe |
CODEN | IITJAU |
CitedBy_id | crossref_primary_10_1109_JIOT_2024_3359509 crossref_primary_10_1007_s11227_023_05437_3 crossref_primary_10_1007_s10207_022_00619_1 crossref_primary_10_1016_j_comnet_2023_109643 crossref_primary_10_1038_s41467_024_47479_y crossref_primary_10_1016_j_cose_2024_104310 crossref_primary_10_1016_j_comnet_2023_109967 crossref_primary_10_1109_TDSC_2023_3239611 crossref_primary_10_3390_s24144621 crossref_primary_10_3389_fenrg_2023_1269059 crossref_primary_10_1109_JIOT_2024_3464100 crossref_primary_10_3390_app14083363 crossref_primary_10_1109_ACCESS_2024_3418995 crossref_primary_10_1109_TIFS_2024_3364370 crossref_primary_10_1016_j_jksuci_2023_101784 crossref_primary_10_1007_s11227_023_05616_2 crossref_primary_10_1016_j_vehcom_2024_100847 crossref_primary_10_1109_JIOT_2023_3270300 crossref_primary_10_3390_iot5010001 crossref_primary_10_1007_s11082_023_04640_z crossref_primary_10_1109_TAES_2023_3307092 crossref_primary_10_1016_j_jnca_2023_103759 crossref_primary_10_1007_s11227_024_06661_1 crossref_primary_10_1016_j_adhoc_2023_103162 crossref_primary_10_1587_elex_19_20220415 crossref_primary_10_1371_journal_pone_0310094 crossref_primary_10_1016_j_comnet_2024_110391 crossref_primary_10_32604_cmc_2024_047625 crossref_primary_10_1109_OJCOMS_2023_3234338 crossref_primary_10_3390_drones8090472 crossref_primary_10_3390_electronics11203398 crossref_primary_10_1109_LNET_2023_3298775 crossref_primary_10_1016_j_cose_2024_103905 crossref_primary_10_1371_journal_pone_0296781 crossref_primary_10_1109_JIOT_2024_3457827 crossref_primary_10_1007_s42979_024_03565_y crossref_primary_10_1016_j_comcom_2023_12_006 crossref_primary_10_1109_ACCESS_2023_3347808 crossref_primary_10_1109_JIOT_2023_3267657 crossref_primary_10_1109_JIOT_2024_3381379 crossref_primary_10_1002_spy2_268 crossref_primary_10_3390_electronics11182925 crossref_primary_10_1007_s12083_024_01839_z crossref_primary_10_1109_OJCAS_2023_3253144 crossref_primary_10_3390_app14051700 crossref_primary_10_1109_JSEN_2022_3216824 crossref_primary_10_32604_cmc_2023_047084 crossref_primary_10_1038_s41598_023_48464_z crossref_primary_10_1016_j_comcom_2024_02_001 crossref_primary_10_1109_MCE_2022_3226585 crossref_primary_10_1109_MCE_2023_3296222 crossref_primary_10_3390_math11081929 crossref_primary_10_1109_ACCESS_2023_3288696 crossref_primary_10_1016_j_iot_2023_100797 crossref_primary_10_1109_ACCESS_2024_3361921 crossref_primary_10_1109_JIOT_2022_3228921 crossref_primary_10_3390_electronics12071646 crossref_primary_10_1016_j_esr_2024_101299 crossref_primary_10_3233_JIFS_240099 crossref_primary_10_3390_mi15040552 crossref_primary_10_1007_s13369_024_08882_1 crossref_primary_10_3390_math12010077 crossref_primary_10_1109_TNSE_2024_3373386 crossref_primary_10_32604_iasc_2023_040502 crossref_primary_10_1016_j_sysarc_2024_103176 crossref_primary_10_1109_JIOT_2024_3431879 crossref_primary_10_1155_2022_4275243 crossref_primary_10_3390_cryptography8010007 crossref_primary_10_1007_s00607_023_01188_4 crossref_primary_10_3390_math11010048 crossref_primary_10_1109_TII_2023_3248107 |
Cites_doi | 10.1016/j.jpdc.2018.04.007 10.1109/MCOM.2016.7470936 10.1109/ACCESS.2019.2926578 10.1109/TIE.2016.2585081 10.1016/j.jnca.2017.10.017 10.23919/ELINFOCOM.2019.8706400 10.1007/s11276-020-02491-0 10.1109/TII.2019.2936278 10.1109/ACCESS.2017.2676119 10.1016/j.future.2018.08.038 10.1007/978-3-642-15031-9_25 10.1007/s10207-019-00484-5 10.1109/JBHI.2017.2753464 10.1016/j.adhoc.2014.03.009 10.1109/MENACOMM46666.2019.8988545 10.1007/978-3-030-24907-6_3 10.1007/s00530-015-0476-3 10.1155/2015/721921 10.3390/s19132957 10.1109/ICC.2017.7996735 10.1002/dac.3195 10.1155/2019/5935292 10.1109/ICCSN.2019.8905295 10.1002/sec.1573 10.1016/j.compeleceng.2017.04.012 10.1007/978-1-4842-5860-6_8 10.1109/TENCON.2019.8929367 10.1109/ICOIN48656.2020.9016538 10.1109/WF-IoT.2016.7845456 10.1109/GLOCOM.2017.8253991 10.12928/telkomnika.v18i1.14798 10.1109/TCAD.2019.2962115 10.7873/DATE.2014.361 10.1016/j.smhl.2018.01.001 10.3390/en11102662 10.1016/j.ins.2019.06.047 10.1016/j.future.2016.12.028 10.1109/ACCESS.2019.2925106 10.1007/978-3-642-14452-3_1 10.1109/JSYST.2021.3101201 10.1002/9781119527978.ch10 10.3390/sym10080352 10.1016/j.dcan.2015.11.001 10.1016/j.future.2020.03.034 10.1016/j.future.2019.06.012 10.3390/electronics9091479 10.1109/TII.2019.2895030 10.1016/j.comcom.2020.11.009 10.1109/DESEC.2017.8073853 10.23919/ChiCC.2018.8482797 10.1109/WETICE.2019.00020 10.1016/j.procs.2020.03.185 10.1155/2014/415415 10.1080/02564602.2020.1726216 10.1109/ICCChina.2019.8855828 10.1007/s00530-013-0346-9 10.1016/j.jisa.2020.102729 10.1109/ICAEM.2018.8536295 10.2478/cait-2019-0002 10.1109/JPROC.2014.2320516 10.1016/j.heliyon.2019.e01591 10.1007/s10916-015-0307-2 10.1016/j.ins.2016.12.046 10.1007/s11277-020-07237-x 10.1109/TDSC.2018.2857811 10.1007/s12083-020-00911-8 10.1109/TDSC.2018.2832201 10.1186/s13677-015-0030-z 10.1109/JSYST.2018.2866067 10.3390/s16122123 10.1016/j.comcom.2019.12.042 10.1109/ACCESS.2020.3007623 10.1109/ICNSS.2011.6060013 10.1155/2017/5989151 10.1109/TSG.2019.2908698 10.1109/CCNC46108.2020.9045264 10.1109/JIOT.2019.2942271 10.1016/j.jnca.2017.07.001 10.1155/2018/5253840 10.1109/JIOT.2017.2780232 10.1109/MCOM.2017.1700451 10.1007/978-1-4614-3363-7_70 10.1109/ISCAS.2011.5938068 10.1109/TSG.2018.2844403 10.1109/JIOT.2020.2970974 10.1109/TWC.2015.2473165 10.1109/TIFS.2018.2832849 10.1007/s40860-019-00079-w 10.1016/j.comnet.2013.08.003 10.1109/TC.2009.109 10.1109/ACCESS.2019.2905347 10.1109/ISQED.2019.8697540 10.1016/j.jnca.2012.03.011 10.1109/COMST.2019.2907650 10.1007/978-3-642-33704-8_6 10.1007/s10776-018-0391-6 10.1109/JIOT.2018.2887086 10.1080/1206212X.2020.1825159 10.1109/ICDSP.2018.8631814 10.1007/978-3-642-41395-7 10.1007/978-3-642-04474-8_22 10.1109/JIOT.2018.2866623 10.1109/ACCESS.2019.2931472 10.1109/TIFS.2017.2659640 10.1007/s10916-017-0720-9 10.1016/j.cose.2020.101958 10.1007/978-3-319-53177-9_2 10.1109/TVT.2020.2976960 10.1016/j.jisa.2020.102585 10.1109/JSEN.2020.3028872 10.1109/JIOT.2019.2939286 10.1109/MVT.2018.2881228 10.1155/2014/347169 10.1145/3005715 10.1109/JIOT.2017.2703088 10.1007/s11227-019-03003-4 10.1016/j.jnca.2016.10.001 10.1016/j.comnet.2018.11.016 10.1109/HST.2018.8383916 10.1109/JIOT.2018.2877690 10.1007/s11277-020-07153-0 10.1109/HST.2011.5955011 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/JIOT.2022.3142084 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2327-4662 |
EndPage | 8228 |
ExternalDocumentID | 10_1109_JIOT_2022_3142084 9677008 |
Genre | orig-research |
GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c359t-7d9c84d92dafd812ca5735ac2bc16956b3479c2fe590b5e373df4db8a6dc42ed3 |
IEDL.DBID | RIE |
ISSN | 2327-4662 |
IngestDate | Mon Jun 30 05:09:35 EDT 2025 Tue Jul 01 04:08:17 EDT 2025 Thu Apr 24 23:00:49 EDT 2025 Wed Aug 27 02:36:18 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 11 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c359t-7d9c84d92dafd812ca5735ac2bc16956b3479c2fe590b5e373df4db8a6dc42ed3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-3592-9421 0000-0001-9208-5336 |
PQID | 2669165039 |
PQPubID | 2040421 |
PageCount | 24 |
ParticipantIDs | proquest_journals_2669165039 ieee_primary_9677008 crossref_primary_10_1109_JIOT_2022_3142084 crossref_citationtrail_10_1109_JIOT_2022_3142084 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-06-01 |
PublicationDateYYYYMMDD | 2022-06-01 |
PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE internet of things journal |
PublicationTitleAbbrev | JIoT |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref57 ref56 ref59 ref58 ref53 ref52 ref55 ref54 Rostami (ref31) 2017 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref9 ref4 ref3 ref6 ref5 ref100 ref101 ref40 ref35 ref34 ref37 ref36 ref30 ref33 (ref114) 2020 ref32 ref39 ref38 Li (ref65) 2019; 21 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref13 ref12 ref15 ref14 ref97 ref126 ref96 ref127 ref11 ref99 ref124 ref10 ref98 ref125 ref17 ref16 ref19 ref18 ref93 ref92 ref95 ref94 ref91 ref90 ref89 ref86 ref85 ref88 ref87 O’Donnell (ref1) 2004 ref82 ref81 ref84 ref83 ref80 ref79 ref108 ref78 ref109 ref106 ref107 ref75 ref104 ref74 ref105 ref77 ref102 ref76 ref103 ref2 Akhundov (ref7) 2020 ref71 ref111 ref70 ref112 ref73 ref72 ref110 ref68 ref119 ref67 ref117 ref69 ref118 ref64 ref115 ref63 ref116 ref66 ref113 ref60 ref122 ref123 ref62 ref120 ref61 ref121 |
References_xml | – ident: ref47 doi: 10.1016/j.jpdc.2018.04.007 – ident: ref77 doi: 10.1109/MCOM.2016.7470936 – ident: ref112 doi: 10.1109/ACCESS.2019.2926578 – ident: ref54 doi: 10.1109/TIE.2016.2585081 – ident: ref72 doi: 10.1016/j.jnca.2017.10.017 – ident: ref16 doi: 10.23919/ELINFOCOM.2019.8706400 – ident: ref38 doi: 10.1007/s11276-020-02491-0 – ident: ref62 doi: 10.1109/TII.2019.2936278 – ident: ref43 doi: 10.1109/ACCESS.2017.2676119 – ident: ref44 doi: 10.1016/j.future.2018.08.038 – ident: ref126 doi: 10.1007/978-3-642-15031-9_25 – ident: ref19 doi: 10.1007/s10207-019-00484-5 – ident: ref26 doi: 10.1109/JBHI.2017.2753464 – ident: ref55 doi: 10.1016/j.adhoc.2014.03.009 – ident: ref3 doi: 10.1109/MENACOMM46666.2019.8988545 – ident: ref119 doi: 10.1007/978-3-030-24907-6_3 – ident: ref56 doi: 10.1007/s00530-015-0476-3 – ident: ref66 doi: 10.1155/2015/721921 – ident: ref64 doi: 10.3390/s19132957 – ident: ref53 doi: 10.1109/ICC.2017.7996735 – ident: ref107 doi: 10.1002/dac.3195 – ident: ref79 doi: 10.1155/2019/5935292 – ident: ref14 doi: 10.1109/ICCSN.2019.8905295 – ident: ref87 doi: 10.1002/sec.1573 – ident: ref69 doi: 10.1016/j.compeleceng.2017.04.012 – ident: ref115 doi: 10.1007/978-1-4842-5860-6_8 – ident: ref106 doi: 10.1109/TENCON.2019.8929367 – ident: ref8 doi: 10.1109/ICOIN48656.2020.9016538 – ident: ref35 doi: 10.1109/WF-IoT.2016.7845456 – ident: ref68 doi: 10.1109/GLOCOM.2017.8253991 – volume-title: PUF authentication and key-exchange by substring matching year: 2017 ident: ref31 – ident: ref105 doi: 10.12928/telkomnika.v18i1.14798 – ident: ref118 doi: 10.1109/TCAD.2019.2962115 – ident: ref117 doi: 10.7873/DATE.2014.361 – ident: ref92 doi: 10.1016/j.smhl.2018.01.001 – ident: ref108 doi: 10.3390/en11102662 – ident: ref18 doi: 10.1016/j.ins.2019.06.047 – ident: ref84 doi: 10.1016/j.future.2016.12.028 – ident: ref4 doi: 10.1109/ACCESS.2019.2925106 – ident: ref2 doi: 10.1007/978-3-642-14452-3_1 – ident: ref116 doi: 10.1109/JSYST.2021.3101201 – ident: ref5 doi: 10.1002/9781119527978.ch10 – ident: ref23 doi: 10.3390/sym10080352 – ident: ref60 doi: 10.1016/j.dcan.2015.11.001 – ident: ref6 doi: 10.1016/j.future.2020.03.034 – ident: ref13 doi: 10.1016/j.future.2019.06.012 – ident: ref111 doi: 10.3390/electronics9091479 – ident: ref49 doi: 10.1109/TII.2019.2895030 – ident: ref39 doi: 10.1016/j.comcom.2020.11.009 – volume-title: PUF-Based Random Number Generation year: 2004 ident: ref1 – ident: ref32 doi: 10.1109/DESEC.2017.8073853 – ident: ref94 doi: 10.23919/ChiCC.2018.8482797 – ident: ref17 doi: 10.1109/WETICE.2019.00020 – ident: ref71 doi: 10.1016/j.procs.2020.03.185 – year: 2020 ident: ref7 article-title: Public-key based authentication architecture for IoT devices using PUF publication-title: arXiv:2002.01277 – ident: ref96 doi: 10.1155/2014/415415 – ident: ref10 doi: 10.1080/02564602.2020.1726216 – ident: ref15 doi: 10.1109/ICCChina.2019.8855828 – volume: 21 start-page: 618 issue: 4 year: 2019 ident: ref65 article-title: A PUF-based group key transfer protocol for Bluetooth publication-title: Int. J. Netw. Security – ident: ref57 doi: 10.1007/s00530-013-0346-9 – ident: ref76 doi: 10.1016/j.jisa.2020.102729 – ident: ref25 doi: 10.1109/ICAEM.2018.8536295 – ident: ref109 doi: 10.2478/cait-2019-0002 – ident: ref86 doi: 10.1109/JPROC.2014.2320516 – ident: ref99 doi: 10.1016/j.heliyon.2019.e01591 – ident: ref83 doi: 10.1007/s10916-015-0307-2 – ident: ref50 doi: 10.1016/j.ins.2016.12.046 – ident: ref52 doi: 10.1007/s11277-020-07237-x – ident: ref113 doi: 10.1109/TDSC.2018.2857811 – ident: ref102 doi: 10.1007/s12083-020-00911-8 – ident: ref22 doi: 10.1109/TDSC.2018.2832201 – ident: ref89 doi: 10.1186/s13677-015-0030-z – ident: ref81 doi: 10.1109/JSYST.2018.2866067 – ident: ref82 doi: 10.3390/s16122123 – ident: ref104 doi: 10.1016/j.comcom.2019.12.042 – ident: ref103 doi: 10.1109/ACCESS.2020.3007623 – ident: ref124 doi: 10.1109/ICNSS.2011.6060013 – ident: ref91 doi: 10.1155/2017/5989151 – ident: ref110 doi: 10.1109/TSG.2019.2908698 – ident: ref36 doi: 10.1109/CCNC46108.2020.9045264 – ident: ref20 doi: 10.1109/JIOT.2019.2942271 – ident: ref42 doi: 10.1016/j.jnca.2017.07.001 – ident: ref75 doi: 10.1155/2018/5253840 – ident: ref78 doi: 10.1109/JIOT.2017.2780232 – ident: ref67 doi: 10.1109/MCOM.2017.1700451 – ident: ref95 doi: 10.1007/978-1-4614-3363-7_70 – ident: ref123 doi: 10.1109/ISCAS.2011.5938068 – ident: ref101 doi: 10.1109/TSG.2018.2844403 – ident: ref9 doi: 10.1109/JIOT.2020.2970974 – ident: ref88 doi: 10.1109/TWC.2015.2473165 – ident: ref34 doi: 10.1109/TIFS.2018.2832849 – ident: ref21 doi: 10.1007/s40860-019-00079-w – ident: ref120 doi: 10.1016/j.comnet.2013.08.003 – ident: ref97 doi: 10.1109/TC.2009.109 – ident: ref74 doi: 10.1109/ACCESS.2019.2905347 – ident: ref12 doi: 10.1109/ISQED.2019.8697540 – ident: ref80 doi: 10.1016/j.jnca.2012.03.011 – ident: ref100 doi: 10.1109/COMST.2019.2907650 – ident: ref121 doi: 10.1007/978-3-642-33704-8_6 – ident: ref93 doi: 10.1007/s10776-018-0391-6 – ident: ref73 doi: 10.1109/JIOT.2018.2887086 – ident: ref51 doi: 10.1080/1206212X.2020.1825159 – ident: ref24 doi: 10.1109/ICDSP.2018.8631814 – ident: ref122 doi: 10.1007/978-3-642-41395-7 – ident: ref48 doi: 10.1007/978-3-642-04474-8_22 – ident: ref29 doi: 10.1109/JIOT.2018.2866623 – ident: ref85 doi: 10.1109/ACCESS.2019.2931472 – ident: ref27 doi: 10.1109/TIFS.2017.2659640 – ident: ref59 doi: 10.1007/s10916-017-0720-9 – ident: ref63 doi: 10.1016/j.cose.2020.101958 – ident: ref33 doi: 10.1007/978-3-319-53177-9_2 – ident: ref11 doi: 10.1109/TVT.2020.2976960 – ident: ref37 doi: 10.1016/j.jisa.2020.102585 – ident: ref45 doi: 10.1109/JSEN.2020.3028872 – ident: ref46 doi: 10.1109/JIOT.2019.2939286 – ident: ref98 doi: 10.1109/MVT.2018.2881228 – ident: ref58 doi: 10.1155/2014/347169 – ident: ref30 doi: 10.1145/3005715 – ident: ref70 doi: 10.1109/JIOT.2017.2703088 – ident: ref40 doi: 10.1007/s11227-019-03003-4 – ident: ref90 doi: 10.1016/j.jnca.2016.10.001 – ident: ref61 doi: 10.1016/j.comnet.2018.11.016 – ident: ref127 doi: 10.1109/HST.2018.8383916 – ident: ref28 doi: 10.1109/JIOT.2018.2877690 – volume-title: MIRACL Cryptographic SDK: Multiprecision Integer and Rational Arithmetic Cryptographic Library. year: 2020 ident: ref114 – ident: ref41 doi: 10.1007/s11277-020-07153-0 – ident: ref125 doi: 10.1109/HST.2011.5955011 |
SSID | ssj0001105196 |
Score | 2.5654073 |
Snippet | Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 8205 |
SubjectTerms | Authentication Authentication and key agreement (AKA) Communication Cryptography Internet of Things Mathematical models physically unclonable function (PUF) Protocols Smart grid Smart grids Wireless sensor networks wireless sensor networks (WSNs) |
Title | PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey |
URI | https://ieeexplore.ieee.org/document/9677008 https://www.proquest.com/docview/2669165039 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwELYoJy7QllbdQpEPnNBmceI4sbltK7Y8xEPaXcEtiu2JQFs2VTaLRH99x052EQ8hbjmME0vfOPPNeB6E7ApgYSFiHVieqyAuNATIWsNAGmYk5zYv_Digs_PkaByfXIvrFdJd1sIAgE8-g5579Hf5tjRzFyrbV0ma-sreD-i4NbVaj_GU0JGRpL24DJnaPzm-GKEDGEXol7pL5PiJ6fGzVF78gL1VGWyQs8V-mmSSSW9e657596xV43s3_JGst_SS9ht9-ERWYPqZbCxGN9D2JG-SyeV4EPxEC2apC5K5lKEmdkfzqaWn8ED76Ij70CG9rMq6RH2ZUSS49LgcdenV8HzW9aLDO9Q9-ru6tbMD2qfuSxXcNFnxdDiv7uHhCxkPDke_joJ27kJguFB1kFplZGxVhEhZJAAmFykXuYm0CRP0p7SrPjVRAUIxLYCn3Bax1TJPrIkjsPwrWZ2WU_hGKNM5D4tCgtFIdAzSSSnSEISQTAKzskPYApLMtE3J3WyMP5l3TpjKHIqZQzFrUeyQveWSv01HjreENx0qS8EWkA7ZXuCetWd2liFVQa4sGFffX1-1Rdbcu5tEsW2yWldz-IGUpNY7Xhf_A1Wv3jI |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Nb9MwFLemcWAXBmyIssF84ISazonjxOZWEKXd1m5SW223KLZftGmjmdIUafz1PDtpJz6EuOXwLFv6Pef93vP7IOS9ABYWItaB5bkK4kJDgKw1DKRhRnJu88KPAxpPkuE8PrkSV1uku6mFAQCffAY99-nf8m1pVi5UdqySNPWVvU_Q7ouwqdZ6jKiEjo4k7dNlyNTxyeh8hi5gFKFn6p6R41-Mj5-m8scv2NuVwS4Zr0_UpJPc9la17pkfvzVr_N8jPyfPWoJJ-41GvCBbsHhJdtfDG2h7l_fI7cV8EHxCG2apC5O5pKEmekfzhaWn8ED76Ir74CG9qMq6RI1ZUqS4dFTOuvRyOll2vej0G2of_Vrd2OVH2qdupwqum7x4Ol1V3-Fhn8wHX2afh0E7eSEwXKg6SK0yMrYqQqwsUgCTi5SL3ETahAl6VNrVn5qoAKGYFsBTbovYapkn1sQRWP6KbC_KBbwmlOmch0UhwWikOgYJpRRpCEJIJoFZ2SFsDUlm2rbkbjrGXebdE6Yyh2LmUMxaFDvkw2bJfdOT41_Cew6VjWALSIccrnHP2lu7zJCsIFsWjKs3f191RJ4OZ-Oz7Gw0OT0gO26fJm3skGzX1QreIkGp9Tuvlz8BFIvhew |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=PUF-Based+Authentication+and+Key+Agreement+Protocols+for+IoT%2C+WSNs%2C+and+Smart+Grids%3A+A+Comprehensive+Survey&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Mall%2C+Priyanka&rft.au=Amin%2C+Ruhul&rft.au=Das%2C+Ashok+Kumar&rft.au=Leung%2C+Mark+T.&rft.date=2022-06-01&rft.pub=IEEE&rft.eissn=2327-4662&rft.volume=9&rft.issue=11&rft.spage=8205&rft.epage=8228&rft_id=info:doi/10.1109%2FJIOT.2022.3142084&rft.externalDocID=9677008 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |