Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777 - 06 February 2023

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to… More >

  • Open Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617 - 28 December 2022

    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function More >

  • Open Access

    ARTICLE

    Lightweight Authentication Protocol Based on Physical Unclonable Function

    Hanguang Luo1, Tao Zou1,*, Chunming Wu2, Dan Li3, Shunbin Li1, Chu Chu4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5031-5040, 2022, DOI:10.32604/cmc.2022.027118 - 21 April 2022

    Abstract In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy, storage, and processing. Although recently many lightweight schemes have been proposed, to the best of our knowledge, they are unable to address the problem of privacy preservation with the resistance of Denial of Service (DoS) attacks in a practical way. In this paper, we propose More >

  • Open Access

    ARTICLE

    PUF-Based Key Distribution in Wireless Sensor Networks

    Zheng Zhang1, Yanan Liu1, *, Qinyuan Zuo1, Lein Harn2, Shuo Qiu1, Yuan Cheng1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1261-1280, 2020, DOI:10.32604/cmc.2020.010034 - 10 June 2020

    Abstract Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor More >

Displaying 1-10 on page 1 of 4. Per Page