10
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices

      , , ,
      Computers & Security
      Elsevier BV

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references69

          • Record: found
          • Abstract: not found
          • Article: not found

          Fuzzy sets

          L.A. Zadeh (1965)
            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Physical one-way functions.

            Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authenticate unique identifiers by physically reducing the medium's microstructure to a fixed-length string of binary digits. These physical one-way functions are inexpensive to fabricate, prohibitively difficult to duplicate, admit no compact mathematical representation, and are intrinsically tamper-resistant. We provide an authentication protocol based on the enormous address space that is a principal characteristic of physical one-way functions.
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Enabling technologies for fog computing in healthcare IoT systems

                Bookmark

                Author and article information

                Journal
                Computers & Security
                Computers & Security
                Elsevier BV
                01674048
                October 2020
                October 2020
                : 97
                : 101938
                Article
                10.1016/j.cose.2020.101938
                9f7c161c-b114-4019-a0f3-4b862d070214
                © 2020

                https://www.elsevier.com/tdm/userlicense/1.0/

                History

                Comments

                Comment on this article