{"id":"https://openalex.org/W4415970946","doi":"https://doi.org/10.1109/jiot.2025.3629693","title":"A Lightweight and Efficient Authentication Protocol Based on AST PUF and Schnorr for IoT","display_name":"A Lightweight and Efficient Authentication Protocol Based on AST PUF and Schnorr for IoT","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W4415970946","doi":"https://doi.org/10.1109/jiot.2025.3629693"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3629693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3629693","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033476804","display_name":"Yuanfeng Xie","orcid":"https://orcid.org/0009-0009-1508-014X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuanfeng Xie","raw_affiliation_strings":["School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0009-1508-014X","affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100756528","display_name":"Weiwei Jiang","orcid":"https://orcid.org/0000-0003-0953-5047"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Jiang","raw_affiliation_strings":["School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-0953-5047","affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072187555","display_name":"Hanqing Luo","orcid":"https://orcid.org/0000-0002-8112-9150"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanqing Luo","raw_affiliation_strings":["School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-8112-9150","affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034555327","display_name":"Jian Ping Gan","orcid":"https://orcid.org/0009-0001-4278-3029"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhong Gan","raw_affiliation_strings":["School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0001-4278-3029","affiliations":[{"raw_affiliation_string":"School of Integrated Circuits, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033476804"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34735219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"1","first_page":"1606","last_page":"1621"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6651999950408936},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43869999051094055},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42980000376701355},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3869999945163727},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.3865000009536743},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.3328000009059906},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.3278999924659729},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.32269999384880066},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.32109999656677246}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8414000272750854},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6651999950408936},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49399998784065247},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4401000142097473},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43869999051094055},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42980000376701355},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41040000319480896},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3869999945163727},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3865000009536743},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.3328000009059906},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.3278999924659729},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.32269999384880066},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.32109999656677246},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.3109000027179718},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.30230000615119934},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.28619998693466187},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2808000147342682},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.2736999988555908},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.27230000495910645},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2590999901294708},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.2508000135421753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25040000677108765},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3629693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3629693","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W609951012","https://openalex.org/W1580991036","https://openalex.org/W2087928947","https://openalex.org/W2095708839","https://openalex.org/W2123482651","https://openalex.org/W2502734849","https://openalex.org/W2801237935","https://openalex.org/W2891953071","https://openalex.org/W2973493345","https://openalex.org/W2980392069","https://openalex.org/W3002189921","https://openalex.org/W3092333758","https://openalex.org/W3094312506","https://openalex.org/W3133167475","https://openalex.org/W3202469839","https://openalex.org/W4287887716","https://openalex.org/W4288391417","https://openalex.org/W4293370535","https://openalex.org/W4293731219","https://openalex.org/W4312795443","https://openalex.org/W4366147501","https://openalex.org/W4385453597","https://openalex.org/W4386275563","https://openalex.org/W4387883655","https://openalex.org/W4391164093","https://openalex.org/W4392405842","https://openalex.org/W4394595343","https://openalex.org/W4395697334","https://openalex.org/W4401070248","https://openalex.org/W4402352669","https://openalex.org/W4402402577","https://openalex.org/W4404132861","https://openalex.org/W4404741497","https://openalex.org/W4405102500","https://openalex.org/W4406949189","https://openalex.org/W4407826192","https://openalex.org/W4407986345","https://openalex.org/W4409536920","https://openalex.org/W4409882973","https://openalex.org/W4409985399","https://openalex.org/W4410028585","https://openalex.org/W4414197540"],"related_works":[],"abstract_inverted_index":{"This":[0,64],"study":[1],"presents":[2],"an":[3,73,124],"innovative":[4],"authentication":[5,22,128],"scheme":[6,121],"that":[7,130,174],"integrates":[8],"Physical":[9],"Unclonable":[10],"Functions":[11],"(PUFs)":[12],"and":[13,20,40,72,93,104,119,191,201,206],"Zero-Knowledge":[14],"Proofs":[15],"(ZKP)":[16],"to":[17,122,155,210],"provide":[18],"efficient":[19],"secure":[21],"for":[23,101],"Internet":[24],"of":[25,136,151],"Things":[26],"(IoT)":[27],"devices.":[28],"Traditional":[29],"PUF-based":[30,116],"protocols":[31],"offer":[32],"strong":[33],"security":[34],"but":[35],"incur":[36],"high":[37],"resource":[38],"costs":[39],"slow":[41],"authentication.":[42],"To":[43],"address":[44],"this,":[45],"we":[46,110],"propose":[47],"a":[48,52,56,67,78,82,115,137],"joint":[49],"scheme.":[50],"First,":[51],"unified":[53],"architecture":[54,65,98,161],"combining":[55],"PUF\u2013True":[57],"Random":[58],"Number":[59],"Generator":[60],"(TRNG)":[61],"is":[62],"introduced.":[63],"utilizes":[66],"feedback":[68],"permutation":[69],"obfuscation":[70],"mechanism":[71],"arbitration":[74],"delay":[75],"deviation":[76],"with":[77,114,185],"metastable":[79],"design":[80],"from":[81],"ring":[83],"oscillator,":[84],"ensuring":[85],"the":[86,107,149,159,166,175],"PUF\u2013TRNG":[87,160],"system":[88],"possesses":[89],"both":[90,102],"attack":[91],"resistance":[92],"true":[94],"random":[95],"properties.":[96],"The":[97,141,196],"provides":[99],"synchronization":[100],"PUF":[103,176],"TRNG":[105],"in":[106],"protocol.":[108],"Next,":[109],"integrate":[111],"Schnorr\u2019s":[112],"ZKP":[113],"key":[117],"encapsulation":[118],"reconstruction":[120],"construct":[123],"end-to-end":[125],"anonymous":[126],"identity":[127],"protocol":[129,142,152,197],"does":[131],"not":[132],"require":[133],"real-time":[134],"participation":[135],"trusted":[138],"third":[139],"party.":[140],"requires":[143],"only":[144],"two":[145],"handshakes,":[146],"significantly":[147],"reducing":[148],"number":[150],"rounds":[153],"compared":[154,209],"related":[156],"protocols.":[157,212],"Finally,":[158],"has":[162],"been":[163],"implemented":[164],"on":[165],"Xilinx":[167],"XC7A100T":[168],"development":[169],"board.":[170],"Experimental":[171],"results":[172],"show":[173],"circuit":[177],"effectively":[178],"resists":[179],"various":[180],"modeling":[181],"attacks.":[182,195],"Formal":[183],"verification":[184],"ProVerif":[186],"demonstrates":[187],"confidentiality,":[188],"mutual":[189],"authentication,":[190],"robustness":[192],"against":[193],"mainstream":[194],"reduces":[198],"area":[199],"overhead":[200],"computational":[202],"time":[203],"by":[204],"43.04%":[205],"42.99%,":[207],"respectively,":[208],"similar":[211]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-06T00:00:00"}
