Podcast
Questions and Answers
What is assumed to be equipped with a PUF in the IoT devices?
What is assumed to be equipped with a PUF in the IoT devices?
- Any device attempting to tamper with the PUF
- The device itself (correct)
- A tamper-resistant sensor
- A secure communication module
What is the purpose of the challenge C generated by the server in the setup phase?
What is the purpose of the challenge C generated by the server in the setup phase?
- To verify the identity of the IoT device
- To start the authentication phase
- To randomly generate a new challenge for resynchronization
- For the next interaction with the device (correct)
What is the master key used for in the proposed scheme?
What is the master key used for in the proposed scheme?
- To generate a one-time alias identity (correct)
- To generate a new challenge for resynchronization
- To create a secure communication channel
- To generate a secret key for the IoT device
What is the purpose of the setup phase in the proposed scheme?
What is the purpose of the setup phase in the proposed scheme?
What is the limitation of the IoT devices in the proposed scheme?
What is the limitation of the IoT devices in the proposed scheme?
What is sent from the IoT device to the server after receiving the challenges {C,Csyn}?
What is sent from the IoT device to the server after receiving the challenges {C,Csyn}?
What is sent to device Di by the server?
What is sent to device Di by the server?
What is generated by the device Di when it wants to interact with the server?
What is generated by the device Di when it wants to interact with the server?
What does the server do after receiving the authentication request message M1?
What does the server do after receiving the authentication request message M1?
What does the device do after receiving the response message M2?
What does the device do after receiving the response message M2?
What is computed by the device to authenticate the server?
What is computed by the device to authenticate the server?
What is computed by the device after authenticating the server?
What is computed by the device after authenticating the server?