Open Access
ARTICLE
Peer-to-Peer IoT Authentication Protocol Based on PUF and Multiple Reference Fuzzy Extractor
1 School of Integrated Circuits, Southeast University, Nanjing, China
2 School of Cyber Science and Engineering, Southeast University, Nanjing, China
* Corresponding Author: Liquan Chen. Email:
# These authors contributed equally to this work
Computers, Materials & Continua 2026, 88(1), 11 https://doi.org/10.32604/cmc.2026.078873
Received 09 January 2026; Accepted 06 March 2026; Issue published 08 May 2026
Abstract
With the rapid development of the Internet of Things (IoT), the widespread adoption of applications such as smart homes and industrial IoT has raised the demand for secure authentication and key agreement among resource-constrained devices over open communication channels. Traditional authentication protocols often rely on centralized servers for key distribution, which results in high communication overhead and exposes systems to single-point-of-failure risks. Moreover, IoT devices are typically constrained in computational resources and are vulnerable to hardware cloning. These limitations necessitate lightweight yet robust security mechanisms. To address these challenges, we propose a lightweight peer-to-peer authentication protocol based on Physically Unclonable Function (PUF) and Multiple Reference Fuzzy Extractor (MRFE). The proposed protocol enables direct mutual authentication and key agreement between IoT devices without the participation of a trusted third-party server. Formal security analysis, along with evaluations of computation and communication costs, demonstrates that the protocol achieves strong security guarantees while maintaining high efficiency. Therefore, the proposed protocol is well-suited for lightweight peer-to-peer authentication scenarios in IoT environments.Keywords
The rapid development of the Internet of Things (IoT) has converted a massive number of terminal devices from isolated entities into collaborative network nodes that interact via cloud and edge infrastructures. Under this circumstance, identity authentication and the establishment of secure communication channels among devices are fundamental to ensuring system security. However, conventional protocols based on complex public key infrastructure (PKI) [1,2] or cryptographic primitives [3–5], while offering strong security guarantees, generally incur significant computation and communication costs. This cost renders them unsuitable for resource-constrained IoT devices.
Physically Unclonable Function (PUF) [6], as an emerging hardware security primitive, exploits inherent manufacturing variations to provide uniqueness and unclonability. These properties make PUFs promising candidates for lightweight authentication mechanisms [7]. Nevertheless, existing PUF-based authentication protocols often depend on third-party servers for authentication and key distribution [8–10]. Such server-assisted approaches typically involve multiple communication rounds, impose heavy computational loads on resource-constrained IoT devices, and introduce risks of single points of failure. More critically, they fail to satisfy the demand for direct peer-to-peer authentication among IoT devices. Additionally, fuzzy extractors are commonly employed to mitigate noise in PUF responses, but their computational complexity remains a considerable burden for resource-constrained terminals [11,12].
To address these challenges, this paper proposes a lightweight peer-to-peer authentication and key agreement protocol that integrates PUF with Multiple Reference Fuzzy Extractor (MRFE). The proposed protocol supports direct mutual authentication between IoT devices after initial registration with the server, significantly reducing communication rounds and eliminating server dependency, thereby improving robustness and communication efficiency. Furthermore, by introducing MRFE into the peer-to-peer authentication context, we reduce the computational load on resource-constrained IoT devices while enhancing the reliability of authentication, as MRFE achieves high fault tolerance without requiring larger error correction blocks that cause overhead explosion in traditional fuzzy extractors.
From a security perspective, we formally prove the security of our protocol under the Real-or-Random (ROR) model and further validate it using the AVISPA tool. Comparative evaluations against existing protocols demonstrate that our protocol achieves high-level security while outperforming baseline protocols in terms of computational efficiency and communication overhead.
The main contributions of this paper are summarized as follows:
• A novel PUF-based peer-to-peer IoT authentication protocol is proposed, eliminating the requirement for pre-shared keys, PKI, or trusted third-party servers.
• MRFE is innovatively integrated into peer-to-peer authentication, reducing PUF computational overhead while enhancing its robustness against noise.
• Formal security verification is conducted using the ROR model and AVISPA tool, demonstrating that the proposed protocol resists common cryptographic and physical attacks.
The remainder of this paper is organized as follows. Section 2 reviews related works, while Section 3 introduces the necessary preliminaries. We present the system model and detail the proposed protocol in Section 4. A comprehensive security analysis is provided in Section 5, followed by a performance evaluation and comparison with existing solutions in Section 6. Finally, Section 7 concludes the paper.
With the rapid evolution of the Internet of Things (IoT), designing secure, efficient, and decentralized authentication mechanisms for resource-constrained IoT devices has emerged as a pivotal research challenge. Existing works can be broadly classified into three categories:
2.1 PKI and Cryptography-Based Protocols
Early IoT authentication protocols were primarily based on PKI [1] and complex cryptographic algorithms such as RSA [3] and elliptic curve cryptography (ECC) [13]. Although these approaches still provide strong security guarantees, their high computational complexity and heavy communication overhead have rendered them unsuitable for IoT devices with limited computational and storage resources. Moreover, PKI-based systems introduce additional challenges such as complex certificate management and key distribution [2,4]. Although identity-based encryption (IBE) [14] partially alleviates the burden of public key management, large-scale IoT deployments still face bottlenecks in private key distribution and updates [15]. To address these challenges, Höglund et al. [16] proposed AutoPKI, which automates credential updates and trust transfer using compact C509 certificates to reduce management overhead. Nevertheless, PKI-based schemes still depend on centralized CAs, resulting in single points of failure and increased latency in revocation and verification.
2.2 PUF-Based Authentication Protocols
To address the demand for lightweight authentication in IoT scenarios, Physically Unclonable Functions (PUFs) have emerged as promising hardware primitives due to their ability to generate unique and unclonable device fingerprints. Traditional PUF-based protocols, however, commonly adopt a server-centric model in which a central server is responsible for authentication and key distribution. For example, in Alladi et al. [8], a base station acts as a trusted third party to allocate session keys for UAVs; in Wang et al. [17], a command center is required to establish keys for terminal devices; and Fan et al. [9] propose an industrial IoT authentication protocol that similarly depends on a domain server. Protocols such as T2T-MAP [10], PUF-RAKE [18], and Chatterjee et al. [19] demonstrate basic authentication capabilities but suffer from excessive communication rounds and vulnerabilities to single points of failure at the server. In addition, PUF-RAKE is insecure against continuous eavesdropping attacks, while Chatterjee et al. [19] requires storing secrets in non-volatile memory, exposing devices to physical extraction attacks. Recently, Nyangaresi et al. [20] proposed a cost-effective PUF- and ECC-based authentication protocol for secure Internet of Drones communications. However, the scheme still depends on a trusted third party for device-to-device authentication and incurs considerable computational overhead due to frequent ECC point multiplications.
2.3 Peer-to-Peer and Decentralized Protocols
To adapt to edge computing and decentralized environments, recent research has shifted toward peer-to-peer authentication protocols without third-party involvement. Clupek and Zeman [21] proposed an ultra-lightweight end-to-end authentication protocol, but it required devices to pre-store challenge-response pairs (CRPs), which increased storage overhead and risked impersonation attacks. Li et al. [22] designed a peer-to-peer authentication protocol integrating ECC, enabling two-way authentication without server involvement, though computationally expensive point multiplication operations imposed significant computational burdens on constrained IoT devices. Zheng et al. [23] proposed an optimized protocol that avoids private key or CRP storage while achieving perfect forward secrecy using ECDH, with physical prototypes demonstrating strong performance. Furthermore, Li et al. [24] introduced a flexible end-to-end protocol that achieves mutual authentication without real-time third-party intervention while providing enhanced anonymity against both verifiers and registration servers. Despite these advancements, most existing protocols still rely heavily on fuzzy extractors to ensure PUF response stability, which imposes non-negligible computational loads on devices [11,15,22–24]. Consequently, reducing the computational and storage burden of error-correction mechanisms while maintaining strong security remains an open research problem.
Existing authentication solutions either rely on heavyweight cryptography with high overhead or server-centric architectures that introduce single points of failure concerns. To address these limitations, this paper proposes a lightweight peer-to-peer authentication protocol based on PUF and Multiple Reference Fuzzy Extractor. The proposed design removes server dependency, reduces computational load on devices, and improves authentication stability, making it suitable for resource-constrained IoT environments.
3.1 Physically Unclonable Functions (PUFs)
A Physically Unclonable Function (PUF) [6] is, in essence, a hardware function rooted in microscopic disparities in the physical structure of a device. Minute random variations inherent in hardware manufacturing processes are capitalized on to generate unique and unpredictable responses (Response, R) corresponding to distinct challenges (Challenge, C), i.e.,
As shown in Fig. 1, PUF responses are mutually independent across different instances or challenges, yet remain consistent for the same challenge-instance pair. Consequently, PUFs can be regarded as the “hardware fingerprint” of devices.

Figure 1: The challenge-response behavior of PUFs.
3.2 Fuzzy Extractor and Multiple Reference Fuzzy Extractor (MRFE)
Although PUFs exhibit strong uniqueness, their responses are affected by environmental noise such as temperature and voltage variations. To obtain stable and reliable keys, error-correction mechanisms like Fuzzy Extractors (FE) are employed. Introduced by Dodis et al. [25], an FE extracts uniformly random keys from noisy data through two core algorithms:
To enhance reliability in dynamic environments, the Multiple Reference Fuzzy Extractor (MRFE) [26] extends FE by maintaining several reference responses
In the generation phase, multiple key-helper pairs
In this section, we describe the system model, adversarial assumptions, and the proposed peer-to-peer authentication and key agreement protocol. The protocol consists of three phases: Setup, Registration, and Peer-to-Peer Authentication and Key Agreement.
As shown in Fig. 2, the IoT system comprises three main entities:
• End Devices (D): Resource-constrained IoT nodes (e.g., sensors, mobile devices) integrated with PUF modules. After initialization, these devices can mutually authenticate with each other and establish secure communication links.
• Cloud Server (CS): A trusted entity responsible for managing devices and securely storing PUF challenge–response pairs (CRPs). It assists only in the registration phase and is not involved in peer-to-peer authentication.
• Router (R): A communication relay between End Devices and the Cloud Server, forwarding messages without executing security-related operations.

Figure 2: Communication system model.
We adopt a strong adversarial model that combines the Dolev-Yao (DY) and Canetti-Krawczyk (CK) frameworks. The adversary is capable of fully controlling the open communication channel (i.e., eavesdropping, modification, replay, and injection of messages) and may also acquire sensitive information through physical compromise of device memory.
Security relies on the following assumptions:
• The cloud server is trusted and securely stores CRPs of devices.
• The PUF hardware is immune to cloning or physical tampering by the adversary.
• Intermediate secrets generated locally during protocol execution but not transmitted remain secure.
Table 1 lists the primary notations used in our protocol.

Prior to deployment, each device is provisioned with a PUF module and undergoes initialization within a trusted environment:
• Global cryptographic primitives (e.g., hash functions, fuzzy extractor algorithms) are agreed upon by all entities.
• Each device generates a unique identifier
• The server queries the device with a predefined set of challenges under different environmental conditions (e.g., −25°C, 25°C, 80°C). For each challenge, the device utilizes the MRFE to produce multiple reference responses
During registration, the server establishes mutual trust with each device and distributes the necessary parameters for future peer-to-peer authentication. The process (illustrated in Fig. 3) is summarized as follows:
Step R1: For device A, the server selects a challenge
Step R2: The server attempts to reconstruct the secret using
Step R3: A nested loop is then executed
Step R4: Upon receiving

Figure 3: A/B-Server registration.
At the end of this phase, devices A and B possess the necessary public parameters and auxiliary data to perform direct mutual authentication without further server involvement.
4.4 Peer-to-Peer Authentication and Key Agreement Phase
Once registered and deployed in the IoT environment, devices can mutually authenticate and negotiate a session key without server participation (see Fig. 4). The procedure is as follows:
Step A1: To initiate communication with device B, device A first generates a one-time random nonce
Step A2: Upon receiving the message, device B first checks whether the target identifier corresponds to its own identity. and verifies the validity of the included parameters
Step A3: Device B generates a fresh random nonce
Step A4: Device A selects the secret mask

Figure 4: A–B mutual authentication and key agreement.
Consequently, the mutual authentication is completed, and a secure session key
In this section, we analyze the security properties of the proposed protocol.
Before proceeding with the analysis, we first establish several security assumptions.
Definition 1: Decisional Uniqueness Problem (DUP)
The security of the proposed protocol relies on the DUP of PUFs [19]. This problem states that it is computationally infeasible for an adversary
Consider a target device with
Since PUF responses exhibit randomness-like behavior, even if the adversary possesses another PUF instance
Definition 2: (Entropy Smoothing Property of Hash Functions [27])
The entropy smoothing property of a hash function can be intuitively understood as its resistance to collision. Even if the input data is non-random, the output
Formally, the adversary’s maximum advantage in distinguishing between the hash output and a random value is defined as:
where
5.2 Formal Security Analysis Using ROR Model
According to the system model, each participant device in the IoT network is denoted as
If the adversary cannot distinguish
Counter with Cipher Block Chaining-Message Authentication Code (CCM) is a block cipher mode of operation that combines CBC-MAC for authentication with CTR mode for encryption, typically applied to the 128-bit AES algorithm. CBC-MAC first authenticates the transmitted data, followed by CTR mode to perform encryption. For an n-block plaintext, CCM requires
Theorem 1: The adversary’s advantage against CCM security is bounded as [30]:
where
To rigorously quantify the security of the proposed protocol, we employ a game-based proof strategy consisting of a sequence of games
Theorem 2: When a probabilistic polynomial-time (PPT) adversary
where
Proof: To prove the session key security of the protocol, we define a series of games
where
where
By Theorem 1, the adversary’s advantage in this game is therefore bounded as:
In the final game, the adversary is assumed to perform all possible oracle queries. However, even with session key exposure, the adversary gains no advantage in distinguishing the hidden bit in the
Therefore, the adversary’s overall advantage from
By combining inequalities Eqs. (6)–(10) into Eq. (11), we obtain the final bound:
The adversary’s advantage in breaking the semantic security of the session key is negligible. □
5.3.1 Perfect Forward Secrecy (PFS)
Since the long-term secrets
5.3.2 Session Key Management Security
The generation of session keys in the proposed protocol does not rely on a centralized server, thereby avoiding the dependency and communication delays associated with traditional third-party key distribution. End devices directly negotiate session keys with each other, improving both efficiency and the confidentiality of session keys.
During the registration phase, the server authenticates end devices using helper data and reconstructed PUF responses. In the mutual authentication phase, devices A and B generate secrets
5.3.4 Resistance to Physical Invasion and Cloning Attacks
It is acknowledged that, despite the physical unclonability of PUFs, recent studies have shown that modeling attacks based on machine learning techniques may attempt to predict PUF behavior given sufficient challenge–response pairs [31,32]. While such attacks are outside the formal threat model considered in this work, the proposed protocol incorporates several design choices to mitigate their practical risk. First, the protocol avoids exposing a large number of challenge–response pairs and restricts CRP usage to the registration phase with a trusted server. Second, hash functions and AES-CCM encryption are employed to prevent direct leakage of PUF-related information through public protocol messages. Finally, for practical deployments, lightweight physical protection mechanisms (e.g., shielding, random delays, or noise injection) can be combined with the proposed protocol to further increase the difficulty of modeling and invasive attacks.
5.3.5 Resistance to Man-in-the-Middle Attacks
Even if an adversary intercepts a message
5.3.6 Resistance to Replay Attacks
The protocol employs fresh random numbers and timestamps
Compared with representative PUF-based authentication schemes, including both server-assisted and decentralized designs, the proposed protocol enables peer-to-peer authentication without third-party participation during the authentication phase. Moreover, it avoids storing sensitive secrets in non-volatile memory and achieves perfect forward secrecy without relying on ECC operations, thereby reducing computational overhead while maintaining strong security guarantees.
A qualitative comparison of security features and design characteristics is presented in Table 2.
5.4 AVISPA Automated Tool Verification
We further verify the protocol using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool. As shown in Fig. 5, the verification results from both the On-the-Fly Model-Checker (OFMC) and the Constraint-Logic-based Attack Searcher (CL-AtSe) backends report a “SAFE” status. In the context of AVISPA, this status signifies that the protocol has been exhaustively analyzed under the Dolev-Yao intruder model, and no execution states were found where the specified security goals could be compromised. Specifically, the tool simulates a wide range of active attack traces, including Man-in-the-Middle (MitM) and replay attacks, by allowing the intruder full control over the communication channel to intercept, modify, or resend messages. The “SAFE” conclusion confirms that the protocol successfully maintains session key secrecy and ensures mutual authentication between peers, effectively resisting impersonation and unauthorized access even in the presence of a malicious adversary.

Figure 5: AVISPA simulation results.
This section evaluates our protocol in terms of communication, storage, and computational cost, and compares it with existing protocols [22,23,33–35]. In addition, we compare the security features of the protocols.
Table 2 summarizes the main functional features, including secure session key establishment, third-party dependence, confidential data storage in non-volatile memory (NVM), and perfect forward secrecy (PFS). All compared protocols provide basic mutual authentication.
Several protocols rely on servers for authentication, incurring higher latency and overhead. The protocol in [35] lacks session key generation. Moreover, the protocols in fail to ensure PFS once long-term secrets are compromised and require the participation of a third-party server. In contrast, the decentralized designs in [22,23] eliminate server dependency, reducing authentication latency and improving system scalability. Our protocol further introduces an efficient fuzzy extractor, eliminating server dependency and reducing computational load on constrained devices, thus enhancing both robustness and efficiency in decentralized IoT environments.
Table 3 lists the computational parameters, where

6.3 Communication and Storage Cost
Table 4 compares the communication and storage cost of our protocol with traditional protocols [22,23,33–35], assuming consistent parameter bit lengths across all protocols. Our protocol achieves lower communication overhead than some existing protocols, requiring only three rounds, which minimizes bandwidth use and latency.

Although compared with [23], our protocol incurs additional storage cost due to the MRFE’s helper data (18 × 128 bits), which is negligible for modern IoT devices. In return, MRFE substantially lowers computational cost and enhances reliability under noisy conditions.
6.4 Robustness and Time Overhead Trend Analysis
In real-world IoT deployments, environmental fluctuations such as temperature, voltage, and electromagnetic interference can destabilize PUF responses, making robustness (the ability of a PUF to generate stable responses under noise) and fault tolerance key metrics.
Our protocol leverages multiple reference responses for redundant error correction, mitigating performance degradation under high bit error rates. Let

Figure 6: Key recovery probability vs. BER for FE and MRFE.
In addition, although the recovery phase of the Multiple Reference Fuzzy Extractor (MRFE) in this scheme needs to try multiple reference responses, resulting in a relatively high time overhead due to a large number of computation rounds. However, this overhead is converted into a core advantage in high fault tolerance scenarios. To meet high fault tolerance requirements, traditional schemes often need to improve error correction strength, which inevitably relies on extremely large error correction code blocks and ultimately triggers the problem of overhead explosion [36]. In contrast, MRFE’s “one-out-of-multiple” strategy avoids this drawback. According to [26], MRFE can save over 40% time overhead compared with traditional FE under low failure rates. Through multi-reference response matching, it greatly reduces the dependence on ultra-large error correction code blocks, thereby cutting down the time overhead and further ensuring the efficient operation of the protocol on resource-constrained terminals.
In terms of scalability, the proposed protocol relies on pairwise registration, which introduces specific constraints in large-scale deployments. To achieve full mesh connectivity in a network of
Consequently, the proposed protocol achieves higher security and robustness with lower computational and communication overhead, making it well-suited for peer-to-peer IoT applications in resource-constrained and variable environments.
To address the lightweight authentication requirements of peer-to-peer IoT scenarios, this paper designs a novel authentication and key agreement (AKA) protocol based on PUF and MRFE. The proposed protocol eliminates the reliance on traditional pre-shared keys or PKI systems, thereby reducing storage and computational overhead. Furthermore, the protocol introduces an enhanced MRFE mechanism to effectively reduce computational cost under a given bit error rate, while its decentralized design avoids dependence on third-party servers, thereby mitigating risks of single points of failure and high latency inherent in centralized architectures. The security of the protocol was rigorously validated through formal analysis under the ROR model, proving the semantic security of the session key, and was further confirmed by the AVISPA automated tool against common threats like man-in-the-middle and replay attacks. Overall, the proposed protocol provides a secure, highly efficient, and lightweight solution that is superior to existing peer-to-peer IoT authentication protocols, offering significant potential for practical deployment in next-generation decentralized IoT systems.
Acknowledgement: This research work is supported by the Big Data Computing Center of Southeast University.
Funding Statement: This research work was funded by the National Natural Science Foundation of China (62572121, U22B2026), Natural Science Foundation of Xizang (XZ202501ZY0094), Frontier Technology R&D Program of Jiangsu (BF2025067), and Open Foundation of Key Laboratory of Cyberspace Security, Ministry of Education of China and Henan Key Laboratory of Network Cryptography (No. KLCS20240301).
Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Liquan Chen, Qingyao Gu, and Mengqi Hu; methodology, Qingyao Gu and Mengqi Hu; writing—original draft preparation, Qingyao Gu, Mengqi Hu, and Zerui Zhao; writing—review and editing, Liquan Chen and Huiyu Fang. All authors reviewed and approved the final version of the manuscript.
Availability of Data and Materials: Not applicable.
Ethics Approval: Not applicable.
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. Wazid M, Das AK, Shetty S. TACAS-IoT: trust aggregation certificate-based authentication scheme for edge-enabled IoT systems. IEEE Internet Things J. 2022;9(22):22643–56. doi:10.1109/JIOT.2022.3181610. [Google Scholar] [CrossRef]
2. Khurshid A, Raza S. AutoCert: automated TOCTOU-secure digital certification for IoT with combined authentication and assurance. Comput Secur. 2023;124(4):102952. doi:10.1016/j.cose.2022.102952. [Google Scholar] [CrossRef]
3. Mumtaz M, Akram J, Ping L. An RSA based authentication system for smart IoT environment. In: Proceedings of the 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS); 2019 Aug 10–12; Zhangjiajie, China. p. 758–65. doi:10.1109/hpcc/smartcity/dss.2019.00112. [Google Scholar] [CrossRef]
4. Singh K, Singh N. Multi-level authentication protocol for enabling secure communication in IoT. Preprint. 2021. doi:10.21203/rs.3.rs-382412/v1. [Google Scholar] [CrossRef]
5. Zou S, Cao Q, Wang C, Huang Z, Xu G. A robust two-factor user authentication scheme-based ECC for smart home in IoT. IEEE Syst J. 2022;16(3):4938–49. doi:10.1109/JSYST.2021.3127438. [Google Scholar] [CrossRef]
6. Pappu R, Recht B, Taylor J, Gershenfeld N. Physical one-way functions. Science. 2002;297(5589):2026–30. doi:10.1126/science.1074376. [Google Scholar] [PubMed] [CrossRef]
7. Aman MN, Basheer MH, Sikdar B. Data provenance for IoT with light weight authentication and privacy preservation. IEEE Internet Things J. 2019;6(6):10441–57. doi:10.1109/JIOT.2019.2939286. [Google Scholar] [CrossRef]
8. Alladi T, Naren, Bansal G, Chamola V, Guizani M. SecAuthUAV: a novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Trans Veh Technol. 2020;69(12):15068–77. doi:10.1109/TVT.2020.3033060. [Google Scholar] [CrossRef]
9. Fan CI, Lai CI, Vishwasrao Medhane D. CAKE-PUF: a collaborative authentication and key exchange protocol based on physically unclonable functions for industrial Internet of Things. IEEE Internet Things J. 2024;11(24):39709–20. doi:10.1109/JIOT.2024.3450959. [Google Scholar] [CrossRef]
10. Lounis K, Zulkernine M. T2T-MAP: a PUF-based thing-to-thing mutual authentication protocol for IoT. IEEE Access. 2021;9:137384–405. doi:10.1109/ACCESS.2021.3117444. [Google Scholar] [CrossRef]
11. Tian C, Jiang Q, Li T, Zhang J, Xi N, Ma J. Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment. Comput Netw. 2022;218(2):109421. doi:10.1016/j.comnet.2022.109421. [Google Scholar] [CrossRef]
12. Zhang S, Yan Z, Liang W, Li KC, Dobre C. BAKA: biometric authentication and key agreement scheme based on fuzzy extractor for wireless body area networks. IEEE Internet Things J. 2024;11(3):5118–28. doi:10.1109/JIOT.2023.3302620. [Google Scholar] [CrossRef]
13. Li T, Ma J, Feng P, Meng Y, Ma X, Zhang J, et al. Lightweight security authentication mechanism towards UAV networks. In: Proceedings of the 2019 International Conference on Networking and Network Applications (NaNA); 2019 Oct 10–13; Daegu, Repubilc of Korea. p. 379–84. doi:10.1109/nana.2019.00072. [Google Scholar] [CrossRef]
14. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Advances in cryptology—CRYPTO 2001. Berlin/Heidelberg, Germany: Springer; 2001. p. 213–29. doi:10.1007/3-540-44647-8_13. [Google Scholar] [CrossRef]
15. Qureshi MA, Munir A. PUF-RAKE: a PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans Dependable Secur Comput. 2022;19(4):2457–75. doi:10.1109/TDSC.2021.3059454. [Google Scholar] [CrossRef]
16. Höglund J, Bouget S, Furuhed M, Preuß Mattsson J, Selander G, Raza S. AutoPKI: public key infrastructure for IoT with automated trust transfer. Int J Inf Secur. 2024;23(3):1859–75. doi:10.1007/s10207-024-00825-z. [Google Scholar] [CrossRef]
17. Wang D, Cao Y, Lam KY, Hu Y, Kaiwartya O. Authentication and key agreement based on three factors and PUF for UAV-assisted post-disaster emergency communication. IEEE Internet Things J. 2024;11(11):20457–72. doi:10.1109/JIOT.2024.3371101. [Google Scholar] [CrossRef]
18. Roy S, Das D, Mondal A, Mahalat MH, Sen B, Sikdar B. PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IoT. IEEE Internet Things J. 2023;10(10):8547–59. doi:10.1109/JIOT.2022.3202265. [Google Scholar] [CrossRef]
19. Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, et al. Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Trans Dependable Secur Comput. 2019;16(3):424–37. doi:10.1109/TDSC.2018.2832201. [Google Scholar] [CrossRef]
20. Nyangaresi VO, Ahmad M, Maghrabi LA, Althaqafi T. Cost-effective PUF and ECC-based authentication protocol for secure Internet of drones communication. IEEE Internet Things J. 2025;12(16):33844–57. doi:10.1109/JIOT.2025.3576313. [Google Scholar] [CrossRef]
21. Clupek V, Zeman V. Robust mutual authentication and secure transmission of information on low-cost devices using Physical unclonable functions and Hash functions. In: Proceedings of the 2016 39th International Conference on Telecommunications and Signal Processing (TSP); 2016 Jun 27–29; Vienna, Austria. p. 100–3. doi:10.1109/TSP.2016.7760837. [Google Scholar] [CrossRef]
22. Li S, Zhang T, Yu B, He K. A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT. IEEE Sens J. 2021;21(4):5487–501. doi:10.1109/JSEN.2020.3028872. [Google Scholar] [CrossRef]
23. Zheng Y, Liu W, Gu C, Chang CH. PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Trans Dependable Secur Comput. 2023;20(4):3299–316. doi:10.1109/TDSC.2022.3193570. [Google Scholar] [CrossRef]
24. Li S, Huang Y, Yu B. A practical and flexible PUF-based end-to-end anonymous authentication protocol for IoT. Comput Netw. 2024;247(4):110426. doi:10.1016/j.comnet.2024.110426. [Google Scholar] [CrossRef]
25. Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Advances in cryptology—EUROCRYPT 2004. Berlin/Heidelberg, Germany: Springer; 2004. p. 523–40. doi:10.1007/978-3-540-24676-3_31. [Google Scholar] [CrossRef]
26. Gao Y, Su Y, Xu L, Ranasinghe DC. Lightweight (reverse) fuzzy extractor with multiple reference PUF responses. IEEE Trans Inf Forensics Secur. 2019;14(7):1887–901. doi:10.1109/TIFS.2018.2886624. [Google Scholar] [CrossRef]
27. Fouque PA, Martinet G, Valette F, Zimmer S. On the security of the CCM encryption mode and of a slight variant. In: Applied cryptography and network security. Berlin/Heidelberg, Germany: Springer; 2008. p. 411–28. doi:10.1007/978-3-540-68914-0_25. [Google Scholar] [CrossRef]
28. Shoup V. Sequences of games: a tool for taming complexity in security proofs. IACR Cryptol Eprint Arch. 2004;2004:332. [Google Scholar]
29. Abdalla M, Fouque PA, Pointcheval D. Password-based authenticated key exchange in the three-party setting. In: Public key cryptography—PKC 2005. Berlin/Heidelberg, Germany: Springer; 2005. p. 65–84. doi:10.1007/978-3-540-30580-4_6. [Google Scholar] [CrossRef]
30. Jonsson J. On the security of CTR + CBC-MAC. In: Selected areas in cryptography. Berlin/Heidelberg, Germany: Springer; 2003. p. 76–93. doi:10.1007/3-540-36492-7_7. [Google Scholar] [CrossRef]
31. Alhamarneh RA, Mahinderjit Singh M. Strengthening Internet of Things security: surveying physical unclonable functions for authentication, communication protocols, challenges, and applications. Appl Sci. 2024;14(5):1700. doi:10.3390/app14051700. [Google Scholar] [CrossRef]
32. Wang H, Hao W, Tang Y, Zhu B, Dong W, Liu W. Deep neural network modeling attacks on arbiter-PUF-based designs. Cybersecurity. 2025;8(1):11. doi:10.1186/s42400-024-00308-7. [Google Scholar] [CrossRef]
33. Karmakar R, Kaddoum G, Akhrif O. A PUF and fuzzy extractor-based UAV-ground station and UAV-UAV authentication mechanism with intelligent adaptation of secure sessions. IEEE Trans Mob Comput. 2024;23(5):3858–75. doi:10.1109/TMC.2023.3284216. [Google Scholar] [CrossRef]
34. Roy S, Mahalat MH, Sen B. Design and implementation of cost-effective end-to-end authentication protocol for PUF-enabled IoT devices. IEEE Trans Emerg Top Comput. 2025;13(3):1055–67. doi:10.1109/TETC.2025.3563064. [Google Scholar] [CrossRef]
35. Barbareschi M, De Benedictis A, La Montagna E, Mazzeo A, Mazzocca N. A PUF-based mutual authentication scheme for Cloud-Edges IoT systems. Future Gener Comput Syst. 2019;101:246–61. doi:10.1016/j.future.2019.06.012. [Google Scholar] [CrossRef]
36. Yu MD, Devadas S. Secure and robust error correction for physical unclonable functions. IEEE Des Test Comput. 2010;27(1):48–65. doi:10.1109/MDT.2010.25. [Google Scholar] [CrossRef]
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools