Journal on Communications ›› 2017, Vol. 38 ›› Issue (6): 127-135.doi: 10.11959/j.issn.1000-436x.2017125
• Papers • Previous Articles Next Articles
Jun WANG1,2,Shu-bo LIU1,2,Cai LIANG1,2,Yong-kai LI1,2
Revised:
2017-04-24
Online:
2017-06-25
Published:
2017-06-30
Supported by:
CLC Number:
Jun WANG,Shu-bo LIU,Cai LIANG,Yong-kai LI. Two-factor wearable device authentication protocol based on PUF and IPI[J]. Journal on Communications, 2017, 38(6): 127-135.
[1] | METIN A . Wiley encyclopedia of biomedical engineering,6-volume set[M]. United States: John Wiley and Sons,Inc pressPress, 2006. |
[2] | ALAA A , AMR M , TAREK E . Energy-cost distortion optimization for delay-sensitive m-health applications[C]// Wireless Telecommunications Symposium(WTS). 2015: 1-5. |
[3] | SAXENA D , RAYCHOUDHURY V , NALLURI S . SmarthealthNDNoT:named data network of things for healthcare services[C]// Proc 2015 Workshop on Pervasive Wireless Healthcare Mobilehealth. 2015: 45-50. |
[4] | FRANCIS T , MADIAJAGAN M , KUMAR V . Privacy issues and techniques in e-health systems[C]// 2015 ACM SIGMIS Conference on Computers and People Research. 2015: 113-115. |
[5] | POON C C Y , ZHANG Y T , BAO S D . A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health[J]. IEEE Communications Magazine, 2006,44(4): 73-81. |
[6] | KONG J , KOUSHANFAR F , PENDYALA P ,et al. PUFatt:embedded platform attestation based on novel processor-based PUFs[C]// 51st Annual Design Automation Conference. 2014: 1-6. |
[7] | MAJZOOBI M , ROSTAMI M , KOUSHANFAR F ,et al. Slender PUF protocol:a lightweight,robust,and secure authentication by substring matching[C]// 2012 IEEE Symposium on Security and Privacy Workshops. 2012: 33-44. |
[8] | PAPPU R , RECHT B , TAYLOR J ,et al. Physical one-way functions[J]. Science, 2002,297(5589): 2026-2030. |
[9] | SUH G E , DEVADAS S . Physical unclonable functions for device authentication and secret key generation[C]// 44th Annual Design Automation Conference. 2007: 9-14. |
[10] | BASSIL R , EL-BEAINO W , KAYSSI A ,et al. A PUF-based ultra-lightweight mutual authentication RFID protocol[C]// Internet Technology and Secured Transactions. 2011: 495-499. |
[11] | JIN Y M , XIN W , SUN H P ,et al. PUF-based RFID authentication protocol against secret key leakage[C]// 14th Asia-Pacific Web Conference. 2012: 318-329. |
[12] | AKGüN M , CAGLAYAN M U . Providing destructive privacy and scalability in RFID systems using PUFs[J]. Ad Hoc Networks, 2015,32: 32-42. |
[13] | ROSTAMI M , MAJZOOBI M , KOUSHANFAR F ,et al. Robust and reverse engineering resilient PUF authentication and key exchange by substring matching[J]. IEEE Transactions on Emerging Topics in Computing, 2014,2(1): 37-49. |
[14] | DELVAUX J , PEETERS R , GU D ,et al. A survey on lightweight entity authentication with strong PUFs[J]. ACM Computing Surveys, 2015,48(2): 1-42. |
[15] | BAO S D , ZHANG Y T , SHEN L F . Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems[C]// 27th Annual International Conference of the Engineering in Medicine and Biology Society (EMBS). 2005: 2455-2458. |
[16] | ZHENG G L , FANG G F , SHANKARAN R ,et al. An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices[C]// 2014 International Symposium on Wireless Personal Multimedia Communications(WPMC). 2014: 624-628. |
[17] | ZHENG G L , FANG G F , SHANKARAN R ,et al. A non-key based security scheme supporting emergency treatment of wireless implants[C]// 2014 IEEE International Conference on Communications(ICC). 2014: 647-652. |
[18] | ZHANG G H , POON C C , ZHANG Y T . A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health[C]// Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS). 2010: 2034-2036. |
[19] | ZHANG G H , POON C C , ZHANG Y T . Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks[J]. IEEE Transactions on Information Technology in Biomedicine, 2012,16(1): 176-182. |
[20] | VENKATASUBRAMANIAN K K , BANERJEE A , GUPTA S K S . EKG- based key agreement in body sensor networks[C]// IEEE INFOCOM Workshops. 2008: 1-6. |
[21] | TEHRANIPOOR M , WANG C . Introduction to hardware security and trust[M]. New York: Springer pressPress, 2012. |
[22] | LIM D , LEE J W , GASSEND B ,et al. Extracting secret keys from integrated circuits[J]. IEEE Transactions on Very Large Scale Intergration (VLSI) Systems, 2005,13(10): 1200-1205. |
[23] | RüHRMAIR U , SEHNKE F , S?LTER J ,et al. Modeling attacks on physical unclonable functions[C]// 17th ACM Conference on Computer and Communications Security(CCS). 2010: 237-249. |
[24] | BHARGAVA M , MAI K . An efficient reliable PUF-based cryptographic key generator in 65nm CMOS[C]// Design,Automation and Test in Europe Conference and Exhibition(DATE). 2014: 1-6. |
[25] | CAPOVILLA J , CORTES M , ARAUJO G . Improving the statistical variability of delay-based physical unclonable functions[C]// 28th Symposium on Integrated Circuits and Systems Design(SBCCI). 2015: 1-7. |
[26] | DELVAUX J , VERBAUWHEDE I . Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes[J]. IEEE Transactions on Circuits and Systems I:Regular Papers, 2014,61(6): 1701-1713. |
[27] | CHE W J , SAQIB F , PLUSQUELLIC J . PUF-based authentication[C]// 2015 IEEE/ACM International Conference on Computer-Aided Design(ICCAD). 2015: 337-344. |
[28] | CHERIF Z , DANGER J L , LOZAC H F ,et al. Evaluation of delay PUFs on CMOS 65 nm technology:ASIC vs FPGA[C]// 2nd International Workshop on Hardware and Architectural Support for Security and Privacy(HASP). 2013: 1-8. |
[29] | DAS M L . Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009,8(3): 1086-1090. |
[30] | SHELTON J , JENKINS J , ROY K ,et al. Genetic based local ternary pattern feature extraction for mitigating replay attacks[C]// SoutheastCon 2016. 2016: 1-2. |
[1] | Jin CAO, Qiuyu BU, Yuanyuan YANG, Hui LI, Qiao LIU, Maode MA. Enhanced Beidou user equipment access authentication protocol based on location key [J]. Journal on Communications, 2022, 43(11): 80-89. |
[2] | Xiangmao CHANG, Jun ZHAN, Zhiwei WANG. Low-cost group-based identity security authentication protocol for NB-IoT nodes [J]. Journal on Communications, 2021, 42(12): 152-162. |
[3] | Zhiqiang ZHU,Renhao LIN,Cuiyun HU. Openstack authentication protocol based on digital certificate [J]. Journal on Communications, 2019, 40(2): 188-196. |
[4] | . Security authentication protocol for RFID based on PRESENT algorithm [J]. Journal on Communications, 2015, 36(Z1): 65-74. |
[5] | Xiu-lei WANG,Guo-min ZHANG,Chao HU,Ming CHEN,Xiang-lin WEI. SDFAC:software defined flow access control mechanism [J]. Journal on Communications, 2015, 36(Z1): 188-196. |
[6] | . Authentication method in SWIM based on improved Diameter/EAP-MD5 [J]. Journal on Communications, 2014, 35(8): 1-7. |
[7] | Zhi-jun WU,Ting ZHAO,Jin LEI. Authentication method in SWIM based on improved Diameter/EAP-MD5 [J]. Journal on Communications, 2014, 35(8): 1-7. |
[8] | Bing CHEN,Jia-qi ZHENG. Lightweight authentication protocol for RFID [J]. Journal on Communications, 2013, 34(Z1): 1-7. |
[9] | Li-cai LIU,Li-hua YIN,Yun-chuan GUO,Yan SUN. Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach [J]. Journal on Communications, 2013, 34(Z1): 58-66. |
[10] | . Lightweight authentication protocol for RFID [J]. Journal on Communications, 2013, 34(Z1): 1-7. |
[11] | . Analysis and improvement for authentication protocols ofmobile ad hoc network with CSP approach [J]. Journal on Communications, 2013, 34(Z1): 8-66. |
[12] | . Rational analysis of authentication protocols based on NGUYEN L H scheme [J]. Journal on Communications, 2013, 34(8): 3-26. |
[13] | Xing-hua LI,Ling-juan DENG,Yuan ZHANG,Jian-feng MA. Rational analysis of authentication protocols based on NGUYEN L H scheme [J]. Journal on Communications, 2013, 34(8): 18-26. |
[14] | Feng XIAO,Ya-jian, ZHOU,Jing-xian ZHOU,Xin-xin NIU. Provable secure mutual authentication protocol for RFID in the standard model [J]. Journal on Communications, 2013, 34(4): 82-87. |
[15] | . Provable secure mutual authentication protocol for RFID in the standard model [J]. Journal on Communications, 2013, 34(4): 9-87. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|