12 Questions
What is assumed to be equipped with a PUF in the IoT devices?
The device itself
What is the purpose of the challenge C generated by the server in the setup phase?
For the next interaction with the device
What is the master key used for in the proposed scheme?
To generate a one-time alias identity
What is the purpose of the setup phase in the proposed scheme?
To carry out operations over a secure channel
What is the limitation of the IoT devices in the proposed scheme?
Limited resources
What is sent from the IoT device to the server after receiving the challenges {C,Csyn}?
The PUF outputs R and Rsyn
What is sent to device Di by the server?
{(AID,Kds), (FID,Ksyn)}
What is generated by the device Di when it wants to interact with the server?
A random number Nd
What does the server do after receiving the authentication request message M1?
Locates one-time alias identity AID in its database
What does the device do after receiving the response message M2?
Authenticates the server and decodes Ns = Kds ⊕ N∗ s
What is computed by the device to authenticate the server?
V0 = h(Nd||Kds||N∗ s)
What is computed by the device after authenticating the server?
sk = h(Kds||k||Nd)
This quiz covers the secure communication of IoT devices with a data center using Physically Unclonable Functions (PUFs) to prevent tampering. Learn about the system model and proposed scheme for secure data transmission. Test your knowledge of IoT security and cloud computing.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free