IoT Security with PUFs and Cloud Computing
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is assumed to be equipped with a PUF in the IoT devices?

  • Any device attempting to tamper with the PUF
  • The device itself (correct)
  • A tamper-resistant sensor
  • A secure communication module

What is the purpose of the challenge C generated by the server in the setup phase?

  • To verify the identity of the IoT device
  • To start the authentication phase
  • To randomly generate a new challenge for resynchronization
  • For the next interaction with the device (correct)

What is the master key used for in the proposed scheme?

  • To generate a one-time alias identity (correct)
  • To generate a new challenge for resynchronization
  • To create a secure communication channel
  • To generate a secret key for the IoT device

What is the purpose of the setup phase in the proposed scheme?

<p>To carry out operations over a secure channel (D)</p> Signup and view all the answers

What is the limitation of the IoT devices in the proposed scheme?

<p>Limited resources (D)</p> Signup and view all the answers

What is sent from the IoT device to the server after receiving the challenges {C,Csyn}?

<p>The PUF outputs R and Rsyn (D)</p> Signup and view all the answers

What is sent to device Di by the server?

<p>{(AID,Kds), (FID,Ksyn)} (B)</p> Signup and view all the answers

What is generated by the device Di when it wants to interact with the server?

<p>A random number Nd (A)</p> Signup and view all the answers

What does the server do after receiving the authentication request message M1?

<p>Locates one-time alias identity AID in its database (C)</p> Signup and view all the answers

What does the device do after receiving the response message M2?

<p>Authenticates the server and decodes Ns = Kds ⊕ N∗ s (A)</p> Signup and view all the answers

What is computed by the device to authenticate the server?

<p>V0 = h(Nd||Kds||N∗ s) (C)</p> Signup and view all the answers

What is computed by the device after authenticating the server?

<p>sk = h(Kds||k||Nd) (C)</p> Signup and view all the answers

More Like This

Internet of Things (IoT) Quiz
5 questions
Internet of Things (IOT) Lecture 1 Quiz
10 questions
Use Quizgecko on...
Browser
Browser