[1] ESCHENAUER L,GLIGOR V D.A key management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communication Security.New York,USA:ACM Press,2002:41-47. [2] DU X J,XIAO Y,GUIZANI M,et al.An effective key management scheme for heterogeneous sensor networks[J].Ad Hoc Networks,2007,5(1):24-34. [3] BOUJELBEN M,CHEIKHROUHOU O,ABID M,et al.Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks[C]//Proceedings of IEEE International Conference on Sensor Technologies.Washington D.C.,USA:IEEE Press,2009:687-698. [4] ERFANI S H,JAVADI H H S,RAHMANI A M.A dynamic key management scheme for dynamic wireless sensor networks[J].Security and Communication Networks,2015,8(6):1040-1049. [5] ALAGHEBAND M R,AREF M R.Dynamic and secure key management model for hierarchical heterogeneous sensor networks[J].IET Information Security,2012,6(4):271-280. [6] MA Mingxin,LI Fengfua,SHI Guozhen,et al.ECC based hierarchical key management scheme for perceptual layer of IoT[J].Journal on Communications,2018,39(S2):5-12.(in Chinese)马铭鑫,李凤华,史国振,等.物联网感知层中基于ECC的分层密钥管理方案[J].通信学报,2018,39(S2):5-12. [7] DELVAUX J,PEETERS R,GU D,et al.A survey on lightweight entity authentication with strong PUFs[J].ACM Computing Surveys,2015,48(2):26-39. [8] BRAUSKA C,FISCHLIN M,SCHRODER H,et al.Physically unclonable functions in the universal composition framework[C]//Proceedings of IEEE CRYPTO'11.Washington D.C.,USA:IEEE Press,2011:51-70. [9] GUAJARDO J.KUMAR S,TUYLS P.Key distribution for wireless sensor networks and physical unclonable functions[C]//Proceedings of International Conference on Secure Component and System Identification Workshop.Berlin,Germany:Springer,2008:334-346. [10] BAHRAMPOUR R,ATANI R E.A novel key management protocol for wireless sensor networks based on PUFs[J].International Journal of Future Generation Communication and Networking,2013,6(2):93. [11] ABUTALEB M,ALLAM A.FPGA-based authenticated key exchange scheme utilizing PUF and CSI for wireless networks[C]//Proceedings of the 10th IEEE International Conference on System of Systems Engineering.Washington D.C.,USA:IEEE Press,2015:170-175. [12] LIU Dan,GUO Limin,YU Jun,et al.A secure mutual authentication protocol based on SRAM PUF[J].Journal of Cryptologic Research,2017,4(4):58-69.(in Chinese)刘丹,郭丽敏,俞军,等.一种基于SRAM PUF的安全双向认证协议[J].密码学报,2017,4(4):58-69. [13] WANG Jun,LIU Shubo,LIANG Cai,et al.Two-factor wearable device authentication protocol based on PUF and IPI[J].Journal on Communications,2017,38(6):127-135.(in Chinese)王俊,刘树波,梁才,等.基于PUF和IPI的可穿戴设备双因子认证协议[J].通信学报,2017,38(6):127-135. [14] CHATTERJEE U,CHAKRABORTY R S,MUKHOPATHYAY D.A PUF based secure communication protocol for IoT[J].ACM Transactions on Embedded Computing Systems,2017,16(3):1-25. [15] BRAEKEN A.PUF based authentication protocol for IoT[J].Symmetry,2018,10(8):352. [16] LI Sensen,HUANG Yicai,YU Bin,et al.A PUF-based low cost secure communication scheme for IoT[J].Acta Electronica Sinica,2019,47(4):46-51.(in Chinese)李森森,黄一才,郁滨,等.基于PUF的低开销物联网安全通信方案[J].电子学报,2019,47(4):46-51. [17] TUYLS P,BATINA L.RFID-tags for anti-counterfeiting[C]//Proceedings of RSA'06.Berlin,Germany:Springer,2006:115-131. [18] BATINA L,GUAJARDO J,KERINS T,et al.Public-key cryptography for RFID-tags[C]//Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.Washington D.C.,USA:IEEE Press,2007:217-222. [19] USMANI M A,KESHAVARZ S,MATTHEWS E,et al.Efficient PUF-based key generation in FPGAs using per-device configuration[J].IEEE Transactions on Very Large Scale Integration Systems,2019,27(2):364-375. [20] DOLEV D,YAO A C.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208. [21] VEYRAT-CHARVILLON N,FRANCOIS-XAVIER S.Generic side-channel distinguishers:improvements and limitations[C]//Proceedings of the 31st Annual Cryptology Conference.Santa Barbara,USA:[s.n.],2011:14-18. [22] AMAN M N,CHUA K C,SIKDAR B.Position paper:physical unclonable functions for IoT security[C]//Proceedings of ACM International Workshop.New York,USA:ACM Press,2016:10-13. [23] GHAITH H,ÖZTURK E,SUNAR B.A tamper-proof and lightweight authentication scheme[J].Pervasive & Mobile Computing,2008,4(6):807-818. [24] MOHAMED Y,MOUSTAFA Y,KHALED A.Energy-aware management for cluster-based sensor networks[J].Computer Networks,2003,43(5):649-668. |