A modeling attack resistant deception technique for securing lightweight-PUF based authentication
Silicon physical unclonable function (PUF) has emerged as a promising spoof-proof solution for low-cost device authentication. Due to practical constraints in preventing phishing through public network or insecure communication channels, simple PUF-based authentication protocol with unrestricted que...
Main Authors: | Gu, Chongyan, Chang, Chip Hong, Liu, Weiqiang, Yu, Shichao, Wang, Yale, O’Neill, Máire |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Journal Article |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/152417 |
Similar Items
-
PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications
by: Zheng, Yue, et al.
Published: (2022) -
Two-factor wearable device authentication protocol based on PUF and IPI
by: Jun WANG, et al.
Published: (2017-06-01) -
Two-factor wearable device authentication protocol based on PUF and IPI
by: Jun WANG, et al.
Published: (2017-06-01) -
Deception defense method against intelligent penetration attack
by: Jinyin CHEN, et al.
Published: (2022-10-01) -
Deception defense method against intelligent penetration attack
by: Jinyin CHEN, et al.
Published: (2022-10-01)