[1] |
HAGHI K M , MADANIPOUR M , NIKRAVAN M ,et al. A systematic review of IoT in healthcare:applications,techniques,and trends[J]. Journal of Network and Computer Applications, 2021,192: 103-164.
|
[2] |
SHAFIQUE K , KHAWAJA B A , SABIR F ,et al. Internet of things (IoT) for next-generation smart systems:a review of current challenges,future trends and prospects for emerging 5G-IoT Scenarios[J]. IEEE Access, 2020,8: 23022-23040.
|
[3] |
BEDI G , VENAYAGAMOORTHY G K , SINGH R . Review of Internet of things (IoT) in electric power and energy systems[J]. IEEE Internet of Things Journal, 2018,5(2): 847-870.
|
[4] |
毅宇, 周威, 赵尚儒 ,等. 物联网安全研究综述:威胁、检测与防御[J]. 通信学报, 2021,42(8): 188-205.
|
|
YANG Y Y , ZHOU W , ZHAO S R ,et al. Survey of IoT security research:threats,detection and defense[J]. Journal on Communications, 2021,42(8): 188-205.
|
[5] |
IBRAHIM A , DALKILIC G . Review of different classes of RFID authentication protocols[J]. Wireless Networks, 2019,25(3): 961-974.
|
[6] |
LI W , LI X L , GAO J T ,et al. Design of secure authenticated key management protocol for cloud computing environments[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(3): 1276-1290.
|
[7] |
IU S M , WANG D , XU G A ,et al. Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(2): 1338-1351.
|
[8] |
AO Y S , AL-SARAWI S F , ABBOTT D . Physical unclonable functions[J]. Nature Electronics, 2020,3(2): 81-91.
|
[9] |
ELVAUX J . Machine-learning attacks on PolyPUFs,OB-PUFs,RPUFs,LHS-PUFs,and PUF-FSMs[J]. IEEE Transactions on Information Forensics and Security, 2019,14(8): 2043-2058.
|
[10] |
叶靖, 胡瑜, 李晓维 . 非确定性仲裁型物理不可克隆函数设计[J]. 计算机辅助设计与图形学学报, 2017,29(1): 166-171.
|
|
YE J , HU Y , LI X W . Nondeterministic logic based arbiter physical unclonable function[J]. Journal of Computer-Aided Design & Computer Graphics, 2017,29(1): 166-171.
|
[11] |
PRADA-DELGADO M A , VáZQUEZ-REYES A , BATURONE I . Trustworthy firmware update for Internet-of-thing devices using physical unclonable functions[C]// Proceedings of 2017 Global Internet of Things Summit (GIoTS). Piscataway:IEEE Press, 2017: 1-5.
|
[12] |
MALL P , AMIN R , DAS A K ,et al. PUF-based authentication and key agreement protocols for IoT,WSNs,and smart grids:a comprehensive survey[J]. IEEE Internet of Things Journal, 2022,9(11): 8205-8228.
|
[13] |
GU C Y , CHANG C H , LIU W Q ,et al. A modeling attack resistant deception technique for securing lightweight-PUF-based authentication[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021,40(6): 1183-1196.
|
[14] |
GOPE P , LEE J , QUEK T Q S . Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions[J]. IEEE Transactions on Information Forensics and Security, 2018,13(11): 2831-2843.
|
[15] |
HOSSAIN M , NOOR S , HASAN R . HSC-IoT:a hardware and software co-verification based authentication scheme for Internet of things[C]// Proceedings of 2017 5th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering (MobileCloud). Piscataway:IEEE Press, 2017: 109-116.
|
[16] |
AKGüN M , ?A?LAYAN M U , . Providing destructive privacy and scalability in RFID systems using PUFs[J]. Ad Hoc Networks, 2015,32: 32-42.
|
[17] |
ZHOU L , LI X , YEH K H ,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance[J]. Future Generation Computer Systems, 2019,91: 244-251.
|
[18] |
MORIYAMA D , MATSUO S , YUNG M . PUF-based RFID authentication secure and private under memory leakage[R]. 2014.
|
[19] |
PATIL A S , HAMZA R , HASSAN A ,et al. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts[J]. Computers & Security, 2020,97:101958.
|
[20] |
XIE Q , HU B , TAN X ,et al. Robust anonymous two-factor authentication scheme for roaming service in global mobility network[J]. Wireless Personal Communications, 2014,74(2): 601-614.
|
[21] |
DOLEV D , YAO A . On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983,29(2): 198-208.
|
[22] |
WANG W Z , CHEN Q , YIN Z M ,et al. Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks[J]. IEEE Internet of Things Journal, 2022,9(11): 8883-8891.
|
[23] |
BIAN W X , GOPE P , CHENG Y Q ,et al. Bio-AKA:an efficient fingerprint based two factor user authentication and key agreement scheme[J]. Future Generation Computer Systems, 2020,109: 45-55.
|
[24] |
QURESHI M A , MUNIR A . PUF-RAKE:a PUF-based robust and lightweight authentication and key establishment protocol[J]. IEEE Transactions on Dependable and Secure Computing, 2021,PP(99): 1.
|
[25] |
黄可可, 刘亚丽, 殷新春 . 一种基于PUF的超轻量级RFID标签所有权转移协议[J]. 密码学报, 2020,7(1): 115-133.
|
|
HUANG K K , LIU Y L , YIN X C . A PUF-based ultra-lightweight ownership transfer protocol for low-cost RFID tags[J]. Journal of Cryptologic Research, 2020,7(1): 115-133.
|
[26] |
FEISTEL H , NOTZ W A , SMITH J L . Some cryptographic techniques for machine-to-machine data communications[J]. Proceedings of the IEEE, 1975,63(11): 1545-1554.
|
[27] |
SCHNEIER B . Applied cryptography:protocols,algorithms,and source code in C[M]. New York: Wiley, 1996.
|
[28] |
HOU S , DENG D , WANG Z Y ,et al. A dynamically configurable LFSR-based PUF design against machine learning attacks[J]. CCF Transactions on High Performance Computing, 2021,3(1): 31-56.
|
[29] |
AYSU A , GULCAN E , MORIYAMA D . End-to-end design of a PUF-based privacy preserving authentication protocol[C]// Cryptographic Hardware and Embedded Systems. Berlin:Springer, 2015: 556-576.
|