IoT Security with PUFs and Cloud Computing
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is assumed to be equipped with a PUF in the IoT devices?

  • Any device attempting to tamper with the PUF
  • The device itself (correct)
  • A tamper-resistant sensor
  • A secure communication module
  • What is the purpose of the challenge C generated by the server in the setup phase?

  • To verify the identity of the IoT device
  • To start the authentication phase
  • To randomly generate a new challenge for resynchronization
  • For the next interaction with the device (correct)
  • What is the master key used for in the proposed scheme?

  • To generate a one-time alias identity (correct)
  • To generate a new challenge for resynchronization
  • To create a secure communication channel
  • To generate a secret key for the IoT device
  • What is the purpose of the setup phase in the proposed scheme?

    <p>To carry out operations over a secure channel</p> Signup and view all the answers

    What is the limitation of the IoT devices in the proposed scheme?

    <p>Limited resources</p> Signup and view all the answers

    What is sent from the IoT device to the server after receiving the challenges {C,Csyn}?

    <p>The PUF outputs R and Rsyn</p> Signup and view all the answers

    What is sent to device Di by the server?

    <p>{(AID,Kds), (FID,Ksyn)}</p> Signup and view all the answers

    What is generated by the device Di when it wants to interact with the server?

    <p>A random number Nd</p> Signup and view all the answers

    What does the server do after receiving the authentication request message M1?

    <p>Locates one-time alias identity AID in its database</p> Signup and view all the answers

    What does the device do after receiving the response message M2?

    <p>Authenticates the server and decodes Ns = Kds ⊕ N∗ s</p> Signup and view all the answers

    What is computed by the device to authenticate the server?

    <p>V0 = h(Nd||Kds||N∗ s)</p> Signup and view all the answers

    What is computed by the device after authenticating the server?

    <p>sk = h(Kds||k||Nd)</p> Signup and view all the answers

    More Like This

    Internet of Things (IoT) Quiz
    5 questions
    Internet of Things (IOT) Lecture 1 Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser