Analysis and Research on the Application of Lightweight Physical Unclonable Function (PUF) Authentication Protocol for IoT Terminals
DOI:
https://doi.org/10.54097/kpme5h37Keywords:
PUF, loT terminals, authentication protocol.Abstract
In this paper, we study a computation-efficient PUF-based authentication protocol suitable for resource-constrained IoT applications. Latency, energy consumption, and security trade-offs are critically important for the efficient and secure operation of IoT and the study addresses the same. We compare the performance characteristics of various PUF implementations and discuss hardware and software optimization techniques. The objective of this study is to conduct an extensive analysis to propose optimized PUF-based authentication protocols, in terms of performance, security, and cost for dedicated IoT applications. The outcomes will benefit both researchers and practitioners in understanding the nuances of PUF-based authentication protocols for various IoT applications, facilitating the design of secure and resource-efficient IoT ecosystems.
Downloads
References
[1] Yue, W., Wu, K., Li, Z., et al. Physical unclonable in-memory computing for simultaneous protecting private data and deep learning models. Nat Commun 16, 1031 (2025).
[2] Zhang Yuefei, Yuan zheng, et al. A lightweight authentication protocol based on PUF for power IoT devices. Application Research of Computers ISSN 1001 - 3695, CN 51 - 1196/TP
[3] Zhang Yuefei, Yuan zheng, et al. Comparative analysis of PUF-based secure authentication protocols Journal of Beijing Electronic Science and Technology Institute 1672 - 464X (2024) 3 - 82 - 94.
[4] Sukhrob Abdulazhanov, Guo, X., Müller, F., et al. Demonstration of high-reconfigurability and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation and charge-domain computing. Nat Commun 16, 189 (2025).
[5] K. Bonawitz, et al. PUF-Secured Federated Learning for Medical Image Analysis. AAAI Conference on Artificial Intelligence, **2023**.
[6] C. Chen. Photonic Physical Unclonable Functions Using Silicon Microresonators. Optical Fiber Communication Conference (OFC), **2022**.
[7] Abulibdeh, E., Saleh, H., Mohammad, B., et al. Kernel-based response extraction approach for efficient configurable ring oscillator PUF. Sci Rep 15, 5938 (2025).
[8] Ulrich Rührmair, Jan Sölter, Frank Sehnke. Modeling Attacks on Physical Unclonable Functions. ACM Conference on Computer and Communications Security (CCS), **2010**.
[9] NISTIR 8309: Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process.
[10] Yansong Gao, Dieyu Chen, Feng Zhou, et al. A PUF-Based Unified Identity and Key Generation Algorithm for IoT Devices. IEEE Internet of Things Journal, **2020**.
[11] Fareena Saqib, Jaya Dofe, Jim Plusquellic. Quantum Threats and Countermeasures in Hardware Security: A Survey. IEEE International Symposium on Hardware Oriented Security and Trust (HOST), **2022**.
[12] Wang Xiong et al. Lightweight Multi Gateway Authentication Protocol Based on PUF in Wireless Sensor Networks Application Research of Computers ISSN 1001 - 3695, CN 51 - 1196/TP.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.