Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study.
Amir Masoud Aminian-ModarresGhazaleh SarbishaeiPublished in: IEEE Netw. Lett. (2023)
Keyphrases
- authentication protocol
- secret key
- hash functions
- smart card
- rfid systems
- key management
- public key
- security analysis
- electronic devices
- management system
- lightweight
- rfid tags
- cloud computing
- signature scheme
- similarity search
- cryptographic protocols
- security problems
- real time
- ban logic
- ubiquitous computing
- anomaly detection
- sensor networks
- similarity measure
- information systems
- data sets