Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (422)

Search Parameters:
Keywords = PUF

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2471 KiB  
Article
Enhancing MQTT-SN Security with a Lightweight PUF-Based Authentication and Encrypted Channel Establishment Scheme
by Xiang Gong, Ting Kou and Yan Li
Symmetry 2024, 16(10), 1282; https://doi.org/10.3390/sym16101282 - 29 Sep 2024
Abstract
The communication of Industrial Internet of Things (IIoT) devices faces important security and privacy challenges. With the rapid increase in the number of devices, it is difficult for traditional security mechanisms to balance performance and security. Although schemes based on encryption and authentication [...] Read more.
The communication of Industrial Internet of Things (IIoT) devices faces important security and privacy challenges. With the rapid increase in the number of devices, it is difficult for traditional security mechanisms to balance performance and security. Although schemes based on encryption and authentication exist, there are still difficulties in achieving lightweight security. In this paper, an authentication and key exchange scheme combining hardware security features and modern encryption technology is proposed for the MQTT-SN protocol, which is not considered security. The scheme uses Physical Unclonable Functions (PUFs) to generate unpredictable responses, and combines random numbers, time stamps, and shared keys to achieve two-way authentication and secure communication between devices and broker, effectively preventing network threats such as replay and man-in-the-middle attacks. Through verification, the proposed scheme has proved effective in terms of security and robustness, has computational and communication cost advantages compared with recent schemes, and provides higher availability. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

14 pages, 3918 KiB  
Article
Preparations of Polyurethane Foam Composite (PUFC) Pads Containing Micro-/Nano-Crystalline Cellulose (MCC/NCC) toward the Chemical Mechanical Polishing Process
by Yi-Shen Huang, Yu-Wen Huang, Qiao-Wen Luo, Chao-Hsing Lin, Penjit Srinophakun, Supanicha Alapol, Kun-Yi Andrew Lin and Chih-Feng Huang
Polymers 2024, 16(19), 2738; https://doi.org/10.3390/polym16192738 - 27 Sep 2024
Abstract
Polyurethane foam (PUF) pads are widely used in semiconductor manufacturing, particularly for chemical mechanical polishing (CMP). This study prepares PUF composites with microcrystalline cellulose (MCC) and nanocrystalline cellulose (NCC) to improve CMP performance. MCC and NCC were characterized using scanning electron microscopy (SEM) [...] Read more.
Polyurethane foam (PUF) pads are widely used in semiconductor manufacturing, particularly for chemical mechanical polishing (CMP). This study prepares PUF composites with microcrystalline cellulose (MCC) and nanocrystalline cellulose (NCC) to improve CMP performance. MCC and NCC were characterized using scanning electron microscopy (SEM) and X-ray diffraction (XRD), showing average diameters of 129.7 ± 30.9 nm for MCC and 22.2 ± 6.7 nm for NCC, both with high crystallinity (ca. 89%). Prior to preparing composites, the study on the influence of the postbaked step on the PUF was monitored through Fourier-transform infrared spectroscopy (FTIR). After that, PUF was incorporated with MCC/NCC to afford two catalogs of polyurethane foam composites (i.e., PUFC-M and PUFC-N). These PUFCs were examined for their thermal and surface properties using a differential scanning calorimeter (DSC), thermogravimetric analysis (TGA), dynamic mechanical analyzer (DMA), and water contact angle (WCA) measurements. Tgs showed only slight changes but a notable increase in the 10% weight loss temperature (Td10%) for PUFCs, rising from 277 °C for PUF to about 298 °C for PUFCs. The value of Tan δ dropped by up to 11%, indicating improved elasticity. Afterward, tensile and abrasion tests were conducted, and we acquired significant enhancements in the abrasion performance (e.g., from 1.04 mm/h for the PUF to 0.76 mm/h for a PUFC-N) of the PUFCs. Eventually, we prepared high-performance PUFCs and demonstrated their capability toward the practical CMP process. Full article
(This article belongs to the Special Issue Polymer Materials for Sensors)
Show Figures

Figure 1

19 pages, 4219 KiB  
Article
Exploring Molecular Drivers of PARPi Resistance in BRCA1-Deficient Ovarian Cancer: The Role of LY6E and Immunomodulation
by Tirzah Braz Petta and Joseph Carlson
Int. J. Mol. Sci. 2024, 25(19), 10427; https://doi.org/10.3390/ijms251910427 - 27 Sep 2024
Abstract
Approximately 50% of patients diagnosed with ovarian cancer harbor tumors with mutations in BRCA1, BRCA2, or other genes involved in homologous recombination repair (HR). The presence of homologous recombination deficiency (HRD) is an approved biomarker for poly-ADP-ribose polymerase inhibitors (PARPis) as a maintenance [...] Read more.
Approximately 50% of patients diagnosed with ovarian cancer harbor tumors with mutations in BRCA1, BRCA2, or other genes involved in homologous recombination repair (HR). The presence of homologous recombination deficiency (HRD) is an approved biomarker for poly-ADP-ribose polymerase inhibitors (PARPis) as a maintenance treatment following a positive response to initial platinum-based chemotherapy. Despite this treatment option, the development of resistance to PARPis is common among recurrent disease patients, leading to a poor prognosis. In this study, we conducted a comprehensive analysis using publicly available datasets to elucidate the molecular mechanisms driving PARPi resistance in BRCA1-deficient ovarian cancer. Our findings reveal a central role for the interferon (IFN) pathway in mediating resistance in the context of BRCA1 deficiency. Through integrative bioinformatics approaches, we identified LY6E, an interferon-stimulated gene, as a key mediator of PARPi resistance, with its expression linked to an immunosuppressive tumor microenvironment (TME) encouraging tumor progression and invasion. LY6E amplification correlates with poor prognosis and increased expression of immune-related gene signatures, which is predictive of immunotherapy response. Interestingly, LY6E expression upon PARPi treatment resistance was found to be dependent on BRCA1 status. Gene expression analysis in the Orien/cBioPortal database revealed an association between LY6E and genes involved in DNA repair, such as Rad21 and PUF60, emphasizing the interplay between DNA repair pathways and immune modulation. Moreover, PUF60, Rad21, and LY6E are located on chromosome 8q24, a locus often amplified and associated with the progression of ovarian cancer. Overall, our study provides novel insights into the molecular determinants of PARPi resistance and highlights LY6E as a promising prognostic biomarker in the management of HRD ovarian cancer. Future studies are needed to fully elucidate the molecular mechanisms underlying the role of LY6E in PARPi resistance. Full article
Show Figures

Figure 1

40 pages, 3816 KiB  
Article
Multiscale Analysis of Sandwich Beams with Polyurethane Foam Core: A Comparative Study of Finite Element Methods and Radial Point Interpolation Method
by Jorge Belinha
Materials 2024, 17(18), 4466; https://doi.org/10.3390/ma17184466 - 11 Sep 2024
Abstract
This study presents a comprehensive multiscale analysis of sandwich beams with a polyurethane foam (PUF) core, delivering a numerical comparison between finite element methods (FEMs) and a meshless method: the radial point interpolation method (RPIM). This work aims to combine RPIM with homogenisation [...] Read more.
This study presents a comprehensive multiscale analysis of sandwich beams with a polyurethane foam (PUF) core, delivering a numerical comparison between finite element methods (FEMs) and a meshless method: the radial point interpolation method (RPIM). This work aims to combine RPIM with homogenisation techniques for multiscale analysis, being divided in two phases. In the first phase, bulk PUF material was modified by incorporating circular holes to create PUFs with varying volume fractions. Then, using a homogenisation technique coupled with FEM and four versions of RPIM, the homogenised mechanical properties of distinct PUF with different volume fractions were determined. It was observed that RPIM formulations, with higher-order integration schemes, are capable of approximating the solution and field smoothness of high-order FEM formulations. However, seeking a comparable field smoothness represents prohibitive computational costs for RPIM formulations. In a second phase, the obtained homogenised mechanical properties were applied to large-scale sandwich beam problems with homogeneous and approximately functionally graded cores, showing RPIM’s capability to closely approximate FEM results. The analysis of stress distributions along the thickness of the beam highlighted RPIM’s tendency to yield lower stress values near domain edges, albeit with convergence towards agreement among different formulations. It was found that RPIM formulations with lower nodal connectivity are very efficient, balancing computational cost and accuracy. Overall, this study shows RPIM’s viability as an alternative to FEM for addressing practical elasticity applications. Full article
Show Figures

Figure 1

23 pages, 1669 KiB  
Article
A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC
by Jiacheng Zhang, Peng Gu, Zhen Wang, Jun Zou and Guangzu Liu
Drones 2024, 8(9), 472; https://doi.org/10.3390/drones8090472 - 9 Sep 2024
Abstract
Due to the limited payload and power of drones, the computational overhead, storage overhead and communication overhead that can be used for secure communication are restricted, making it difficult to apply some complex but fairly secure authentication protocols on drones. In this paper, [...] Read more.
Due to the limited payload and power of drones, the computational overhead, storage overhead and communication overhead that can be used for secure communication are restricted, making it difficult to apply some complex but fairly secure authentication protocols on drones. In this paper, we propose a low-complexity protocol for storing identity information in a resource-unconstrained device that does not require the UAV to store the information, thereby enhancing the UAV’s resistance to capture. The protocol in this paper mainly consists of quasi-cyclic low-density parity-check (QC-LDPC) codes, physical unclonable functions (PUFs) based on random-access memory (RAM), “XOR” operations, and hash computation. The protocol in this paper is an authentication architecture in which the drone is guided by the ground station to read its identity information, and the drone does not store any identity information in advance. The protocol is divided into two phases: 1. fuzzy authentication of fingerprint PUF and 2. uniqueness authentication accomplished while guiding the recovery of identity PUF. Recovering identity PUF in this paper, QC-LDPC is used as the error control module, and the optimization of bit-flip decoding significantly reduces the probability of decoding failure. After the comparative security analysis and comparative overhead analysis of this paper’s protocol, it can be concluded that this paper’s protocol can withstand common attacks (including attacks attempting to pass authentication, attacks attempting to interfere with authentication, and physical capture attacks), and the storage and communication overhead is small in the case of large time overhead. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

17 pages, 3648 KiB  
Article
Privacy-Preserving Authentication Based on PUF for VANETs
by Lihui Li, Hanwen Deng, Zhongyi Zhai and Sheng-Lung Peng
Future Internet 2024, 16(9), 326; https://doi.org/10.3390/fi16090326 - 8 Sep 2024
Abstract
The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks. To resist physical attacks, we [...] Read more.
The secret key is stored in an ideal tamper-proof device so that a vehicle can implement a secure authentication with the road-side units (RSUs) and other drivers. However, some adversaries can capture the secret key by physical attacks. To resist physical attacks, we propose a physical-preserving authentication based on a physical unclonable function for vehicular ad hoc networks. In the proposed scheme, a physical unclonable function is deployed on the vehicle and the RSU to provide a challenge–response mechanism. A secret key is only generated by the challenge–response mechanism when it is needed, which eliminates the need to store a long-term secret key. As a result, this prevents secret keys from being captured by adversaries, improving system security. In addition, route planning is introduced into the proposed scheme so that a vehicle can obtain the authentication key of RSUs on its route before vehicle-to-infrastructure authentication, which greatly speeds up the authentication when the vehicle enters the RSUs’ coverage. Furthermore, a detailed analysis demonstrates that the proposed scheme achieves security objectives in vehicular ad hoc networks. Ultimately, when contrasted with similar schemes, the performance assessment demonstrates that our proposed scheme surpasses others in terms of computational overhead, communication overhead and packet loss rate. Full article
Show Figures

Figure 1

13 pages, 1517 KiB  
Article
Characterization of Food-Additive Titanium Dioxide and Dietary Exposure to Titanium Dioxide Nanoparticles among the Chinese Population
by Yue Cao, Huali Wang, Chunlai Liang, Qing Liu, Tong Ou, Ling Yong, Xiao Xiao, Haixia Sui, Dingguo Jiang, Zhaoping Liu, Sheng Wei and Yan Song
Nanomaterials 2024, 14(17), 1427; https://doi.org/10.3390/nano14171427 - 31 Aug 2024
Viewed by 297
Abstract
Titanium dioxide (TiO2) is a prevalent food additive, yet comprehensive data on particle size and dietary exposure are lacking in China. Transmission electron microscopy results revealed that the quantitative proportion of nanoparticles (NPs) in food-additive TiO2 was 37.7%, with a [...] Read more.
Titanium dioxide (TiO2) is a prevalent food additive, yet comprehensive data on particle size and dietary exposure are lacking in China. Transmission electron microscopy results revealed that the quantitative proportion of nanoparticles (NPs) in food-additive TiO2 was 37.7%, with a mass fraction of 9.89%. Laboratory test results showed that among the domestic products surveyed, candies excluding gum-based candies contained the highest content of TiO2. Using consumption data from the China Health and Nutrition Survey in 2018, the average dietary exposure for TiO2 and TiO2 NPs in the Chinese population were calculated at 34.84 and 3.44 μg/kg bw/day, respectively. The primary dietary sources were puffed food and powdered drinks. Exposure varied significantly across age and region, with children and Inner Mongolia residents having the highest intake. TiO2 NP exposure showed a negative correlation with age. Despite this, the dietary exposure risk of TiO2 NPs for the Chinese population remains deemed acceptable. Full article
Show Figures

Figure 1

33 pages, 2291 KiB  
Article
Hardware-Efficient Configurable Ring-Oscillator-Based Physical Unclonable Function/True Random Number Generator Module for Secure Key Management
by Santiago Sánchez-Solano, Luis F. Rojas-Muñoz, Macarena C. Martínez-Rodríguez and Piedad Brox
Sensors 2024, 24(17), 5674; https://doi.org/10.3390/s24175674 - 31 Aug 2024
Viewed by 334
Abstract
The use of physical unclonable functions (PUFs) linked to the manufacturing process of the electronic devices supporting applications that exchange critical data over the Internet has made these elements essential to guarantee the authenticity of said devices, as well as the confidentiality and [...] Read more.
The use of physical unclonable functions (PUFs) linked to the manufacturing process of the electronic devices supporting applications that exchange critical data over the Internet has made these elements essential to guarantee the authenticity of said devices, as well as the confidentiality and integrity of the information they process or transmit. This paper describes the development of a configurable PUF/TRNG module based on ring oscillators (ROs) that takes full advantage of the structure of modern programmable devices offered by Xilinx 7 Series families. The proposed architecture improves the hardware efficiency with two main objectives. On the one hand, we perform an exhaustive statistical characterization of the results derived from the exploitation of RO configurability. On the other hand, we undertake the development of a new version of the module that requires a smaller amount of resources while considerably increasing the number of output bits compared to other proposals previously reported in the literature. The design as a highly parameterized intellectual property (IP) module connectable through a standard interface to a soft- or hard-core general-purpose processor greatly facilitates its integration into embedded solutions while accelerating the validation and characterization of this element on the same electronic device that implements it. The studies carried out reveal adequate values of reliability, uniqueness, and unpredictability when the module acts as a PUF, as well as acceptable levels of randomness and entropy when it acts as a true random number generator (TRNG). They also illustrate the ability to obfuscate and recover identifiers or cryptographic keys of up to 4096 bits using an implementation of the PUF/TRNG module that requires only an array of 4×4 configurable logic blocks (CLBs) to accommodate the RO bank. Full article
(This article belongs to the Collection Cryptography and Security in IoT and Sensor Networks)
Show Figures

Figure 1

10 pages, 1644 KiB  
Article
Formate Emission in the Mainstream Aerosols of Heated Tobacco Products Distributed in Japan
by Masaki Kawaguchi and Yoshika Sekine
Atmosphere 2024, 15(9), 1045; https://doi.org/10.3390/atmos15091045 - 29 Aug 2024
Viewed by 287
Abstract
Heated tobacco products (HTPs) are newly developed nicotine delivery systems via the inhalation of mainstream aerosols generated during the heating of tobacco leaf materials. Previous studies have shown that the amount of chemicals generated is much lower than that generated by conventional combustible [...] Read more.
Heated tobacco products (HTPs) are newly developed nicotine delivery systems via the inhalation of mainstream aerosols generated during the heating of tobacco leaf materials. Previous studies have shown that the amount of chemicals generated is much lower than that generated by conventional combustible cigarettes. However, little attention has been paid to formate, a conjugated base of formic acid with potentially toxic effects on human health. This study aims to understand the actual emission levels and behaviour of formate in mainstream aerosols produced by commercially available HTP devices in Japan. Aerosols were generated from four types of devices with regular and menthol-type flavours using a vaping machine following the CRM 81 puffing protocol. Formate was tapped in 5 mM sodium carbonate solution and subsequently analysed using ion chromatography. The results showed that the total emission amount of formate ranged from 0.0027 ± 0.0031 to 0.27 ± 0.055 mg L−1, varying with heating temperature and flavour type. Moreover, the majority of formate existed in a particulate form due to the weak-basic property of the aerosol, and the formate emission level was much greater than the workplace exposure limit for the direct inhalation of mainstream aerosols. The formate in the mainstream aerosol can be considered a health concern, when using “high-temperature type” HTPs over a long period. Full article
(This article belongs to the Special Issue Health Impacts Related to Indoor Air Pollutants)
Show Figures

Figure 1

12 pages, 3354 KiB  
Article
Gas Sensor Physically Unclonable Function-Based Lightweight Bidirectional Authentication Protocol for Gas Sensor Networks
by Shuang Hu, Pengjun Wang, Haonan He, Yuejun Zhang and Xiangyu Li
Electronics 2024, 13(17), 3385; https://doi.org/10.3390/electronics13173385 - 26 Aug 2024
Viewed by 333
Abstract
In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonable functions (GS-PUFs) with authentication technology [...] Read more.
In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonable functions (GS-PUFs) with authentication technology to guarantee the reliability of data from sensor nodes. A sensor PUF array is constructed by preparing gas sensors to enhance the data security of the physical layer and reduce hardware resource consumption. The authentication part of the protocol mainly uses lightweight encryption methods, consisting of PUF data, one-way cryptographic hash functions, and iso-or functions, to reduce the computational overhead of the authentication process. The protocol security is enhanced by encrypting the GS-PUF response as an irreversible hash value and verifying the hash value by the user, server, and sensor node to complete bidirectional authentication. The test results demonstrate that the protocol, verified through the ProVerif formal tool, can resist impersonation, replay, node tampering, and cloning attacks. Among the compared schemes, this protocol offers the highest security and the least resource overhead, making it effectively applicable in the Internet of Things and other fields. Full article
Show Figures

Figure 1

23 pages, 12187 KiB  
Article
Improving Self-Healing Dental-Restorative Materials with Functionalized and Reinforced Microcapsules
by Bao Quoc Huynh, Sivashankari Rajasekaran, Joao Batista, Steven Lewis, Mario Alexandre Coelho Sinhoreti, Carmem Silvia Pfeifer and Ana Paula Fugolin
Polymers 2024, 16(17), 2410; https://doi.org/10.3390/polym16172410 - 24 Aug 2024
Viewed by 604
Abstract
Dental resin composites are widely used in clinical settings but often face longevity issues due to the development and accumulation of microcracks, which eventually lead to larger cracks and restoration failure. The incorporation of microcapsules into these resins has been explored to introduce [...] Read more.
Dental resin composites are widely used in clinical settings but often face longevity issues due to the development and accumulation of microcracks, which eventually lead to larger cracks and restoration failure. The incorporation of microcapsules into these resins has been explored to introduce self-healing capability, potentially extending the lifespan of the restorations. This study aims to enhance the performance of self-healing dental resins by optimizing the microcapsules–resin matrix physicochemical interactions. Poly(urea–formaldehyde) (PUF) microcapsules were reinforced with melamine and subsequently subjected to surface functionalization with 3-aminopropyltriethoxysilane (APTES) and (3-mercaptopropyl)trimethoxysilane (MPTMS). Additionally, microcapsules were functionalized with a bilayer approach, incorporating tetraethyl orthosilicate (TEOS) with either APTES or MPTMS. X-ray photoelectron spectroscopy (XPS) and thermogravimetric analysis (TGA) confirmed an increased Si:C ratio from 0.006 to 0.165. The functionalization process did not adversely affect the structure of the microcapsules or their healing agent volume. Compared to PUF controls, the functionalized microcapsules demonstrated enhanced healing efficiency, with TEOS/MPTMS-functionalized microcapsules showing the highest performance, showing a toughness recovery of up to 35%. This work introduces a novel approach to functionalization of microcapsules by employing advanced silanizing agents such as APTES and MPTMS, and pioneering bilayer functionalization protocols through their combination with TEOS. Full article
(This article belongs to the Special Issue Advances in Polymeric Dental Materials)
Show Figures

Graphical abstract

15 pages, 3112 KiB  
Article
Polyurethane Foam and Algae-Based Activated Carbon Biocomposites for Oil Spill Remediation
by Lokmane Abdelkaddous Baidar, Malika Medjahdi, Badra Mahida, Belaid Mechab and Dominique Baillis
Materials 2024, 17(16), 4137; https://doi.org/10.3390/ma17164137 - 21 Aug 2024
Viewed by 423
Abstract
This study investigates the incorporation of algae-based activated carbon into polyurethane foam to improve a biocomposite for gasoil sorption. The biocomposites were thoroughly analyzed using various techniques to examine the properties of both the blank foam and the algae activated carbon foam with [...] Read more.
This study investigates the incorporation of algae-based activated carbon into polyurethane foam to improve a biocomposite for gasoil sorption. The biocomposites were thoroughly analyzed using various techniques to examine the properties of both the blank foam and the algae activated carbon foam with a carbon content of 4.41 mass% and particle diameter of 500 µm. These techniques included Scanning Electron Microscopy (SEM), thermogravimetric analysis (TGA), and density analysis. The TGA analysis revealed that the biocomposites had an impact on the onset temperature (Tonset) of the foams. Higher concentrations of the biocomposites resulted in a decrease in Tonset from approximately 310 °C in the blank foam (PUF0) to 300 °C in the composite (PUF3B). The final residue percentage also decreased from around 20% in PUF0 to 10% in PUF3B. Density analysis showed that the apparent density of the foam increased from 0.016 g/cm3 in the blank foam to 0.020 g/cm3 in the biocomposite (PUF3B), while the real density slightly decreased from 0.092 g/cm3 to 0.076 g/cm3, indicating a reduction in overall porosity from 82.5% to 74.4%. All foams that were modified showed an increase in their ability to absorb gasoil in a PUF/gasoil/water system. The optimized biocomposite (PUF1B), with 1.14 mass% of 500 µm algae carbon, displayed the highest sorption capacity, starting at approximately 50 g/g at 1.5 h and increasing to 53 g/g over 72 h. The analysis of adsorption kinetics revealed that by utilizing adsorption isotherms, particularly the Langmuir isotherm, a more accurate fit to the data was achieved. This allowed for the prediction of the maximum gasoil adsorption capacity. This study aims to further develop, analyze, and utilize biocomposites made from algae-based activated carbon and polyurethane. These materials offer a sustainable and environmentally friendly approach to cleaning up oil spills. Full article
Show Figures

Figure 1

30 pages, 1213 KiB  
Article
Secure PUF-Based Authentication Systems
by Naing Win Tun and Masahiro Mambo
Sensors 2024, 24(16), 5295; https://doi.org/10.3390/s24165295 - 15 Aug 2024
Viewed by 530
Abstract
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT’s unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle [...] Read more.
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT’s unique security needs and resource constraints. Existing solutions like Identity-Based Encryption with Physically Unclonable Functions enhance security but still struggle with protecting data during transmission. We show a new protocol that leverages PUFs for device authentication by utilizing Paillier homomorphic encryption or the plaintext equality test to enhance security. Our approach involves encrypting both the challenge–response pairs (CRPs) using Paillier homomorphic encryption scheme or ElGamal encryption for plaintext equality testing scheme. The verifier does not need access to the plaintext CRPs to ensure that sensitive data remain encrypted at all times and our approach reduces the computational load on IoT devices. The encryption ensures that neither the challenge nor the response can be deciphered by potential adversaries who obtain them during the transmission. The homomorphic property of the Paillier scheme or plaintext equality testing scheme allows a verifier to verify device authenticity without decrypting the CRPs, preserving privacy and reducing the computational load on IoT devices. Such an approach to encrypting both elements of the CRP provides resistance against CRP disclosure, machine learning attacks, and impersonation attacks. We validate the scheme through security analysis against various attacks and evaluate its performance by analyzing the computational overhead and the communication overhead. Comparison of average computational and communication time demonstrates Paillier scheme achieves approximately 99% reduction while the plaintext equality test achieves approximately 94% reduction between them. Full article
(This article belongs to the Special Issue Communication, Security, and Privacy in IoT)
Show Figures

Figure 1

28 pages, 2228 KiB  
Article
SLAKA-IoD: A Secure and Lightweight Authentication and Key Agreement Protocol for Internet of Drones
by Yuelei Xiao and Yu Tao
Drones 2024, 8(8), 374; https://doi.org/10.3390/drones8080374 - 4 Aug 2024
Viewed by 606
Abstract
The existing authentication and key agreement (AKA) schemes for the internet of drones (IoD) still suffer from various security attacks and fail to ensure required security properties. Moreover, drones generally have limited memory and computation capability. Motivated by these issues, a secure and [...] Read more.
The existing authentication and key agreement (AKA) schemes for the internet of drones (IoD) still suffer from various security attacks and fail to ensure required security properties. Moreover, drones generally have limited memory and computation capability. Motivated by these issues, a secure and lightweight AKA protocol for IoD (SLAKA-IoD) is proposed based on physical unclonable function (PUF), “exclusive or” (XOR) operation and hash function, which are simple cryptographic operations and functions that can provide better performance. In the SLAKA-IoD protocol, a drone and the ground station (GS) perform mutual authentication and establish a secure session key between them, and any two drones can also perform mutual authentication and establish a secure session key between them. Via informal security analysis, formal security analysis using the strand space model, and security verification based on the Scyther tool, the SLAKA-IoD protocol is proven to resist various security attacks and ensure required security properties. Further comparative analysis shows that the SLAKA-IoD protocol can provide more security features, and is generally lightweight as compared with these related AKA protocols for IoD, so it is suitable for IoD. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

21 pages, 475 KiB  
Article
A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET
by Deokkyu Kwon, Seunghwan Son, Kisung Park and Youngho Park
Mathematics 2024, 12(15), 2383; https://doi.org/10.3390/math12152383 - 31 Jul 2024
Viewed by 564
Abstract
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still [...] Read more.
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still exist, because sensitive data of the vehicle user is necessary for generating a high-accuracy AI model. In this paper, we propose an authentication scheme to preserve the privacy of user data in edge intelligence-enabled VANETs. The proposed scheme can establish a secure communication channel using fuzzy extractor, elliptic curve cryptography (ECC), and physical unclonable function (PUF) technology. The proposed data upload process can provide privacy of the data using local differential privacy and symmetric key encryption. We validate the security robustness of the proposed scheme using informal analysis, the Real-Or-Random (ROR) model, and the Scyther tool. Moreover, we evaluate the computation and communication efficiency of the proposed and related schemes using Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK). We simulate the practical deployment of the proposed scheme using network simulator 3 (NS-3). Our results show that the proposed scheme has a performance improvement of 10∼48% compared to the state-of-the-art research. Thus, we can demonstrate that the proposed scheme provides comprehensive and secure communication for data management in edge intelligence-enabled VANET environments. Full article
Show Figures

Figure 1

Back to TopTop