Fuel monitoring system based on IoT: overview and device authentication

SL Nita, MI Mihailescu - 2022 14th international conference on …, 2022 - ieeexplore.ieee.org
In recent years, more and more devices, such as smart mobile devices, smart tags, sensors,
or chips have been connected to the Internet. All these devices are part of the Internet of …

Deeper insight into why authentication schemes in IoT environments fail to achieve the desired security

Y Guo, Y Guo, P Xiong, F Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Designing an efficient and secure authentication scheme is a significant means to ensure
the security of IoT systems. Hundreds of authentication schemes tailored for IoT …

Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection

Y Zhang, B Li, B Liu, J Chang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) have emerged as hardware fingerprints for IoT
devices in the form of challenge-response pairs (CRPs). This mapping behaviour is …

Secure and Low-Delay CAN-FD Communication in Embedded Microcontroller: A Cooperative Swapping Approach

R Lu, G Xie, R Li, Y Liu, X Liu, W Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
As promising industrial embedded networks, Controller Area Networks with Flexible Data-
rate (CAN-FD) are widely used in time-sensitive domains, such as automotive networks …