Buchoveck
´
a, S., L
´
orencz, R., Bucek, J., and Kod
´
ytek, F.
(2020). Lightweight authentication and secure com-
munication suitable for iot devices. In ICISSP, pages
75–83.
Buchoveck
´
a, S., L
´
orencz, R., Bu
ˇ
cek, J., and Kod
´
ytek,
F. (2022). Symmetric and asymmetric schemes for
lightweight secure communication. In Information
Systems Security and Privacy, Basel, CH. Springer
Nature Switzerland AG.
Burrows, M., Abadi, M., and Needham, R. M. (1989). A
logic of authentication. Proceedings of the Royal So-
ciety of London. A. Mathematical and Physical Sci-
ences, 426(1871):233–271.
Chatterjee, U., Chakraborty, R. S., and Mukhopadhyay, D.
(2017). A puf-based secure communication protocol
for iot. ACM Transactions on Embedded Computing
Systems (TECS), 16(3):1–25.
Cremers, C. (2011). Key exchange in ipsec revisited: For-
mal analysis of ikev1 and ikev2. In European Sympo-
sium on Research in Computer Security, pages 315–
334. Springer.
Cremers, C. and Mauw, S. (2012). Security properties.
In Operational Semantics and Verification of Security
Protocols, pages 37–65. Springer.
Cremers, C. J. (2008). The scyther tool: Verification, falsi-
fication, and analysis of security protocols. In Inter-
national conference on computer aided verification,
pages 414–418. Springer.
Delvaux, J., Gu, D., Schellekens, D., and Verbauwhede, I.
(2014). Helper data algorithms for puf-based key gen-
eration: Overview and analysis. IEEE Transactions
on Computer-Aided Design of Integrated Circuits and
Systems, 34(6):889–902.
Herder, C., Yu, M.-D., Koushanfar, F., and Devadas,
S. (2014). Physical unclonable functions and ap-
plications: A tutorial. Proceedings of the IEEE,
102(8):1126–1141.
Idriss, T. and Bayoumi, M. (2017). Lightweight highly se-
cure puf protocol for mutual authentication and secret
message exchange. In 2017 IEEE International Con-
ference on RFID Technology & Application (RFID-
TA), pages 214–219. IEEE.
Lowe, G. (1995). An attack on the needham- schroeder
public- key authentication protocol. Information pro-
cessing letters, 56(3).
Lowe, G. (1997). A hierarchy of authentication specifica-
tions. In Proceedings 10th Computer Security Foun-
dations Workshop, pages 31–43. IEEE.
Maes, R., Tuyls, P., and Verbauwhede, I. (2009). A soft
decision helper data algorithm for sram pufs. In 2009
IEEE international symposium on information theory,
pages 2101–2105. IEEE.
Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D. S.,
and Devadas, S. (2012). Slender puf protocol: A
lightweight, robust, and secure authentication by sub-
string matching. In 2012 IEEE Symposium on Security
and Privacy Workshops, pages 33–44. IEEE.
Merli, D., Stumpf, F., and Sigl, G. (2013). Protecting puf
error correction by codeword masking. Cryptology
ePrint Archive.
Needham, R. M. and Schroeder, M. D. (1978). Using en-
cryption for authentication in large networks of com-
puters. Communications of the ACM, 21(12):993–999.
Nimmy, K., Sankaran, S., and Achuthan, K. (2021). A
novel lightweight puf based authentication protocol
for iot without explicit crps in verifier database. Jour-
nal of Ambient Intelligence and Humanized Comput-
ing, pages 1–16.
Ray, B. R., Chowdhury, M. U., and Abawajy, J. H. (2016).
Secure object tracking protocol for the internet of
things. IEEE Internet of things Journal, 3(4):544–553.
Vigano, L. (2006). Automated security protocol analysis
with the avispa tool. Electronic Notes in Theoretical
Computer Science, 155:61–86.
Zargar, S., Shahidinejad, A., and Ghobaei-Arani, M.
(2021). A lightweight authentication protocol for iot-
based cloud environment. International Journal of
Communication Systems, 34(11):e4849.
Verification of PUF-based IoT Protocols with AVISPA and Scyther
635