{"id":"https://openalex.org/W4400230395","doi":"https://doi.org/10.1109/iscas58744.2024.10558672","title":"PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices","display_name":"PUF-based Lightweight Mutual Authentication Protocol for Internet of Things (IoT) Devices","publication_year":2024,"publication_date":"2024-05-19","ids":{"openalex":"https://openalex.org/W4400230395","doi":"https://doi.org/10.1109/iscas58744.2024.10558672"},"language":"en","primary_location":{"id":"doi:10.1109/iscas58744.2024.10558672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas58744.2024.10558672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102953337","display_name":"Kamal Raj","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Kamal Raj","raw_affiliation_strings":["Nanyang Technological University,Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010439079","display_name":"B. Srinivasu","orcid":"https://orcid.org/0000-0003-0974-8245"},"institutions":[{"id":"https://openalex.org/I9579091","display_name":"Indian Institute of Technology Mandi","ror":"https://ror.org/05r9r2f34","country_code":"IN","type":"education","lineage":["https://openalex.org/I9579091"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Srinivasu Bodapati","raw_affiliation_strings":["Indian Institute of Technology,Mandi,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology,Mandi,India","institution_ids":["https://openalex.org/I9579091"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["Nanyang Technological University,Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102953337"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":4.1585,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.95301928,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9517999887466431,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.8413102626800537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6868737936019897},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6419872045516968},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6242485642433167},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5858529210090637},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5750819444656372},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5270951986312866},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.512181282043457},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3678608536720276}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.8413102626800537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6868737936019897},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6419872045516968},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6242485642433167},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5858529210090637},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5750819444656372},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5270951986312866},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.512181282043457},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3678608536720276},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas58744.2024.10558672","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas58744.2024.10558672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2130630988","https://openalex.org/W2613748018","https://openalex.org/W2809674292","https://openalex.org/W2955419213","https://openalex.org/W2964505775","https://openalex.org/W2969281952","https://openalex.org/W2979729503","https://openalex.org/W2986455874","https://openalex.org/W3028234905","https://openalex.org/W3048592926","https://openalex.org/W3092333758","https://openalex.org/W3110885177","https://openalex.org/W3131713529","https://openalex.org/W3133167475","https://openalex.org/W3134051239","https://openalex.org/W3212456559","https://openalex.org/W3214872473","https://openalex.org/W4200219140","https://openalex.org/W4205302645","https://openalex.org/W4206648042","https://openalex.org/W4206900226","https://openalex.org/W4225750189","https://openalex.org/W4287887716","https://openalex.org/W4293731219","https://openalex.org/W4308659699","https://openalex.org/W4312349588","https://openalex.org/W4313307834","https://openalex.org/W4318969776","https://openalex.org/W4362683547","https://openalex.org/W6769453268"],"related_works":["https://openalex.org/W2482813613","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W106082050","https://openalex.org/W2043851470","https://openalex.org/W2399882206","https://openalex.org/W3201780008"],"abstract_inverted_index":{"The":[0,127,141,159],"Internet":[1,40],"of":[2,41,67,165,186,193],"Things(IoT)":[3],"can":[4,49],"transfer":[5],"data":[6,53,79,137],"between":[7,120],"the":[8,12,16,39,61,65,68,121,125,134,149,155,174,179,194],"sensor":[9,135],"node":[10,136,183],"and":[11,26,81,97,109,117,124,148],"cloud":[13,62],"server":[14,63],"with":[15,64],"Internet\u2019s":[17],"help":[18,66],"for":[19,101,114,132],"various":[20,30],"automated":[21,156],"tasks":[22],"like":[23],"remote":[24],"monitoring":[25],"controlling.":[27],"IoT":[28,44,82],"has":[29],"applications":[31,48],"in":[32,46,145],"different":[33],"sections,":[34],"including":[35],"healthcare,":[36],"also":[37],"called":[38],"Medical":[42],"Things(IoMT).":[43],"used":[45,113,131],"healthcare":[47],"collect":[50],"patient\u2019s":[51],"biomedical":[52],"through":[54],"medical":[55],"sensors,":[56],"which":[57,168,189],"is":[58,130,143,152,169,190],"sent":[59],"to":[60,173],"Internet.":[69],"IoT/IoMT":[70,102,122],"systems":[71],"are":[72,112],"having":[73],"serious":[74],"challenging":[75],"concerns":[76],"such":[77],"as":[78],"security":[80],"device\u2019s":[83],"security.":[84],"Hence,":[85],"this":[86],"paper":[87],"proposes":[88],"a":[89,110,182],"Physically":[90],"Unclonable":[91],"Function(PUF)":[92],"based":[93],"lightweight":[94,105],"mutual":[95,115],"authentication":[96,116],"key":[98,118,129],"agreement":[99,119],"protocol":[100,142,161,180],"devices.":[103],"A":[104],"AEAD":[106],"cipher,":[107],"ASCON,":[108],"PUF":[111],"device":[123],"server.":[126],"agreed":[128],"encrypting":[133],"using":[138,154],"ASCON":[139],"cipher.":[140],"implemented":[144],"Artix-7":[146],"FPGA,":[147],"formal":[150],"verification":[151],"performed":[153],"tool":[157],"Proverif.":[158],"proposed":[160],"takes":[162],"912":[163],"bits":[164],"communication":[166],"cost,":[167],"13%":[170],"less":[171],"compared":[172],"best":[175,195],"existing":[176,196],"protocol.":[177,197],"Further,":[178],"requires":[181],"storage":[184],"cost":[185],"128":[187],"bits,":[188],"only":[191],"66%":[192]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
