CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN

[1]  Tarik Taleb,et al.  A green strategic activity scheduling for UAV networks: A sub-modular game perspective , 2016, IEEE Communications Magazine.

[2]  Harmanpreet Singh Grover,et al.  An efficient anonymous user authentication and key agreement protocol for wireless sensor networks , 2021, Int. J. Commun. Syst..

[3]  Mohsen Guizani,et al.  Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function , 2020, IEEE Transactions on Vehicular Technology.

[4]  Jeroen Delvaux,et al.  Key-recovery attacks on various RO PUF constructions via helper data manipulation , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[5]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[6]  An Braeken,et al.  PUF Based Authentication Protocol for IoT , 2018, Symmetry.

[7]  Cheng-Chi Lee,et al.  Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.

[8]  Yoney Kirsal Ever,et al.  Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks , 2019, IEEE Syst. J..

[9]  Adamu Murtala Zungeru,et al.  Communication protocols for wireless sensor networks: A survey and comparison , 2019, Heliyon.

[10]  Ruhul Amin,et al.  Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs , 2021, J. Inf. Secur. Appl..

[11]  Debdeep Mukhopadhyay,et al.  A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[12]  Muhammad Khurram Khan,et al.  An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[13]  Miodrag Potkonjak,et al.  Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.

[14]  Kim-Kwang Raymond Choo,et al.  Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.

[15]  Xiong Li,et al.  Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.

[16]  Marian Margraf,et al.  Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance , 2019, IACR Cryptol. ePrint Arch..

[17]  Ashok Kumar Das,et al.  A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..

[18]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[19]  Sourav Mukhopadhyay,et al.  A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.

[20]  Guangjie Han,et al.  A Comparative Study of Routing Protocols of Heterogeneous Wireless Sensor Networks , 2014, TheScientificWorldJournal.

[21]  Prosanta Gope,et al.  A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.

[22]  Gang Qu,et al.  Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security , 2020, IEEE Transactions on Industrial Electronics.

[23]  Khalid Alsubhi,et al.  A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks , 2020, Wireless Personal Communications.

[24]  Qiang Ni,et al.  Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks , 2018, IEEE Communications Magazine.

[25]  Hanif Ullah,et al.  5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.

[26]  Jiliang Zhang,et al.  Approximation Attacks on Strong PUFs , 2020, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[27]  Md. Zakirul Alam Bhuiyan,et al.  A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function , 2019, SpaCCS.

[28]  Walid Saad,et al.  Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach , 2019, IEEE Transactions on Wireless Communications.

[29]  Devender Kumar,et al.  Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks , 2020 .

[30]  Ashok Kumar Das,et al.  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[31]  Jan Sölter,et al.  PUF modeling attacks: An introduction and overview , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[32]  Saraju P. Mohanty,et al.  Everything You Wanted to Know About PUFs , 2017, IEEE Potentials.

[33]  Xiong Li,et al.  An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.

[34]  An Braeken,et al.  PUF‐Based Authentication and Key Exchange for Internet of Things , 2020 .