IoT Security with PUFs and Cloud Computing

ReachableMinotaur avatar
ReachableMinotaur
·
·
Download

Start Quiz

Study Flashcards

12 Questions

What is assumed to be equipped with a PUF in the IoT devices?

The device itself

What is the purpose of the challenge C generated by the server in the setup phase?

For the next interaction with the device

What is the master key used for in the proposed scheme?

To generate a one-time alias identity

What is the purpose of the setup phase in the proposed scheme?

To carry out operations over a secure channel

What is the limitation of the IoT devices in the proposed scheme?

Limited resources

What is sent from the IoT device to the server after receiving the challenges {C,Csyn}?

The PUF outputs R and Rsyn

What is sent to device Di by the server?

{(AID,Kds), (FID,Ksyn)}

What is generated by the device Di when it wants to interact with the server?

A random number Nd

What does the server do after receiving the authentication request message M1?

Locates one-time alias identity AID in its database

What does the device do after receiving the response message M2?

Authenticates the server and decodes Ns = Kds ⊕ N∗ s

What is computed by the device to authenticate the server?

V0 = h(Nd||Kds||N∗ s)

What is computed by the device after authenticating the server?

sk = h(Kds||k||Nd)

This quiz covers the secure communication of IoT devices with a data center using Physically Unclonable Functions (PUFs) to prevent tampering. Learn about the system model and proposed scheme for secure data transmission. Test your knowledge of IoT security and cloud computing.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser