作者: Sherali Zeadally , Fatemeh Afghah , Ashwija Korenda , Alireza Shamsoshoara
DOI:
关键词: Authentication 、 Computer security 、 Computer science 、 Physical unclonable function 、 Internet of Things 、 Cryptography 、 Key generation 、 Domain (software engineering) 、 Identification (information)
摘要: The vast areas of applications for IoTs in future smart cities, transportation systems, and so on represent a thriving surface several security attacks with economic, environmental societal impacts. This survey paper presents review the challenges emerging IoT networks discusses some their countermeasures based different domains networks. Most conventional solutions are adopted from communication while noting particular characteristics such as nodes quantity, heterogeneity, limited resources nodes, these methods not adequate. One challenge toward utilizing common secret key-based cryptographic large-scale is problem key generation, distribution, storage protecting keys physical attacks. Physically unclonable functions (PUFs) can be utilized possible hardware remedy identification authentication IoTs. Since PUFs extract unique characteristics, they potentially offer an affordable practical solution generation. However, barriers limit PUFs' generation purposes. We discuss advantages PUF-based methods, we present state-of-the-art techniques this domain. also proof-of-concept using resistive random-access memories (ReRAM) embedded