Flam-puf: A response–feedback-based lightweight anti-machine-learning-attack puf

L Wu, Y Hu, K Zhang, W Li, X Xu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) have been adopted in many resource-constrained
Internet of Things (IoT) applications to provide effective and lightweight solutions for device …

A new authentication procedure for client-server applications using HMAC

V Shukla, MK Misra, A Chaturvedi - Journal of discrete …, 2021 - Taylor & Francis
Hash functions are used for data integrity and authentication but unfortunately they suffer
with man in the middle attack problem. An intruder who has command over the …

CRC-PUF: A machine learning attack resistant lightweight PUF construction

E Dubrova, O Näslund, B Degen… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Adversarial machine learning is an emerging threat to security of Machine Learning (ML)-
based systems. However, we can potentially use it as a weapon against ML-based attacks …

Group key distribution procedures for the L-band digital aeronautical communications system (LDACS)

T Ewert, N Mäurer, T Gräupl - 2021 IEEE/AIAA 40th Digital …, 2021 - ieeexplore.ieee.org
Since the beginning of the century, an increasing amount of air traffic has pushed current
aeronautical communication systems to their limits. Therefore, a modernization process is …

Canon: Lightweight and practical cyber-attack detection for automotive controller area networks

Y Baek, S Shin - Sensors, 2022 - mdpi.com
Automotive cyber-physical systems are in transition from the closed-systems to open-
networking systems. As a result, in-vehicle networks such as the controller area network …

Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check

A Lotto, A Brighente, M Conti - arXiv preprint arXiv:2411.14394, 2024 - arxiv.org
Integrating modern communication technologies into legacy systems, such as Industrial
Control Systems and in-vehicle networks, invalidates the assumptions of isolated and …

Signing and verifying encrypted medical images using double random phase encryption

HA Abdallah, DH ElKamchouchi - Entropy, 2022 - mdpi.com
Digital Signature using Self-Image signing is introduced in this paper. This technique is used
to verify the integrity and originality of images transmitted over insecure channels. In order to …

Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles.

A Taurshia, JW Kathrine - Fusion: Practice & Applications, 2023 - search.ebscohost.com
Smart applications came into existence with technological advancements like Software
Defined Networks (SDN), Cloud computing, Network Function Virtualization (NFV), and the …

Authentication of Diffie-Hellman protocol against man-in-the-middle attack using cryptographically secure CRC

N Naher, Asaduzzaman, MM Haque - Proceedings of International Ethical …, 2018 - Springer
Diffie-Hellman key exchange (DHKE) protocol, which is also known as exponential key
exchange protocol, is one of the practical ways of generating a common secret key between …

Lightweight message authentication for constrained devices

E Dubrova, M Näslund, G Selander… - Proceedings of the 11th …, 2018 - dl.acm.org
Message Authentication Codes (MACs) used in today's wireless communication standards
may not be able to satisfy resource limitations of simpler 5G radio types and use cases such …