Wouters L, Marin E, Ashur T et al (2019) Fast, furious and insecure: Passive keyless entry and start systems in modern supercars. IACR Trans Cryptogr Hardw Embed Syst 3:66–85
Article
Google Scholar
Joo K, Choi W, Lee DH (2020) Hold the door! fingerprinting your car key to prevent keyless entry car theft. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020
Chatterjee U, Sadhukhan R, Govindan V et al (2018) PUFSSL: an openssl extension for PUF based authentication. In: 23rd IEEE International Conference on Digital Signal Processing, DSP 2018, pp 1–5
Lim D, Lee J, Gassend B et al (2005) Extracting secret keys from integrated circuits. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 13(10):1200–1205
Hammouri G, Öztürk E, Sunar B (2008) A tamper-proof and lightweight authentication scheme. Pervasive Mob Comput 4(6):807–818
Article
Google Scholar
Majzoobi M, Rostami M, Koushanfar F et al (2012) Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. In: 2012 IEEE Symposium on Security and Privacy Workshops, pp 33–44
Öztürk E, Hammouri G, Sunar B (2008) Towards robust low cost authentication for pervasive devices. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008)
Delvaux J, Gu D, Schellekens D et al (2014) Secure lightweight entity authentication with strong pufs: Mission impossible? In: Batina L, Robshaw M (eds) Cryptographic Hardware and Embedded Systems - CHES 2014
Kitsos P, Zhang Y (2008) Rfid security techniques, protocols and system-on-chip design. Springer. RFID Fundamentals and Applications pp 3–27
Jiang Q, Zhang X, Zhang N et al (2019) Two-factor authentication protocol using physical unclonable function for iov. In: 2019 IEEE/CIC International Conference on Communications in China, ICCC
Renault É, Mühlethaler P, Boumerdassi S (2021) Communication security in vanets based on the physical unclonable function. In: ICC 2021 - IEEE International Conference on Communications
Al-Fadhli SA, Lu S, Chen K et al (2020) MFSPV: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets. IEEE Access 8:142,858–142,874
Sharma G, Joshi AM, Mohanty SP (2021) An efficient physically unclonable function based authentication scheme for V2G network. In: IEEE International Symposium on Smart Electronic Systems, iSES 2021
Bansal G, Naren N, Chamola V et al (2020) Lightweight mutual authentication protocol for V2G using physical unclonable function. IEEE Trans Veh Technol 69(7):7234–7246
Article
Google Scholar
Labrado C, Thapliyal H, Mohanty SP (2022) Fortifying vehicular security through low overhead physically unclonable functions. ACM J Emerg Technol Comput Syst 18(1):8:1–8:18
Smith C (2016) The Car Hacker’s Handbook: A Guide for the Penetration Tester, 1st edn. No Starch Press, USA
Google Scholar
Wang Y, Wang C, Gu C, Cui Y, O'Neill M, Liu W (2021) A dynamically configurable PUF and dynamic matching authentication Protocol. IEEE Transactions on Emerging Topics in Computing. https://doi.org/10.1109/TETC.2021.3072421
Gu C, Chang CH, Liu W, Yu S, Wang Y, O’Neill M (2021) A modeling attack resistant deception technique for securing lightweight-PUF-based authentication. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 10;40(6):1183-96. https://doi.org/10.1109/TCAD.2020.3036807
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–207
MathSciNet
Article
Google Scholar
Cremers C (2006) Scyther: semantics and verification of security protocols. PhD thesis, Mathematics and Computer Science
Cremers CJF (2008) The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta A, Malik S (eds) Computer Aided Verification, 20th International Conference, CAV, vol 5123. Lecture Notes in Computer Science. Springer, pp 414–418
Chapter
Google Scholar
Lowe G (1997) A hierarchy of authentication specification. In: 10th Computer Security Foundations Workshop (CSFW ’97), pp 31–44
Chatterjee U, Chakraborty RS, Mukhopadhyay D (2017) A puf-based secure communication protocol for iot. ACM Trans Embed Comput Syst 16(3)