Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices".
Michael AmarAmit KamaKang WangYossi OrenPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- resource constrained
- authentication scheme
- key management
- electronic devices
- embedded systems
- wireless sensor networks
- sensor networks
- resource constraints
- rfid tags
- security mechanisms
- power consumption
- smart card
- security flaws
- user authentication
- mobile devices
- smart phones
- secret key
- security protocols
- authentication protocol
- sensor nodes
- security analysis
- cloud computing
- low cost
- public key
- metaheuristic
- data streams