Research Article

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Table 2

Summary of cryptographic techniques applied using PUF authentication mechanisms.

SchemeYearCryptographic techniques and environmentAdvantagesDrawbacks/limitations

Xu et al. [15]2021Based on PUF is applicable for RFID healthcare systemsFits for healthcare systemsDoes not support “revocability.” Vulnerable to “know session key attack”

Gope and Sikdar [16]2019Based on smart grid communication systems. The lightweight cryptographic primitives such as physically unclonable functions and one-way hash function is utilizedA novel privacy-aware authenticated key agreement scheme which can not only ensure secure communication between smart meters and the service providers, but also the physical security of smart meters(i) Does not support “revocability and password/biometric update”
(ii) Vulnerable to “known session key attack”

Cao et al. [17]2021(i) Based on “three factors (user mobile device, user password, and personal biometrics”(i) Applicable in smart grid environment and data collection scheme(i) Does not support “revocability and password/biometric update”
(ii) Applies “ECC cryptographic technique”(ii) Vulnerable to “mutual authentication attack” and “known session key attack”
(iii) Uses “fuzzy extractor for biometric verification”

Zhang et al. [18]2020Key distribution in wireless sensor networksIt did not only save the storage overhead, but also provided perfect resilience against sensor capture attacksThis cannot resist anonymity, traceability, and forward secrecy attacks

Mall et al. [19]2022This approach is a survey on PUF-based authentication and key agreement protocols for IoT, WSN, and smart grids(i) This survey paper can be utilized to understand the technologies such as IoT, WSN, and smart grids and the way to address the AKA in these technologiesThis study fails to address the security pitfalls which can integrate all these technologies
(ii) Systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast-growing areas of IoT, WSNs, and smart grids based on a meticulous survey of existing literature

Liu et al. [20]2021Key distribution for dynamic sensor networksCompared with traditional key predistribution schemes, the proposal reduces the storage overhead and the key exposure risks and thereby improves the resilience against node capture attacksThis study cannot be applied to the current technologies such as IoT and cloud computing

Mukhopadhyay [21]2016PUFs as promising tools for security in Internet of Things. This article discusses about security violation in the authentication of a commercial IoT(i) Studied the lightweight construction of PUFsThis study fails to address the security features and how they can be applied for the AKA protocols
(ii) Proof context test-bed simulations were presented for commercially available tools to show how PUFs can interact with other IoT nodes to provide overall security

Wang et al. [22]2021Blockchain and lightweight authentication protocol for wireless medical sensor networks. Applies “fuzzy extractor for biometric verification”Incorporated for blockchain and wireless medical sensor networks(i) Desynchronization attacks
(ii) Excess communication cost

Lee and Chen [23]2021Lightweight fog computing-based authentication protocols using physically unclonable functions for Internet of medical Things(i) The proposed protocols use lightweight cryptographic operations, including a one-way cryptographic hash function, the barrel shifter physically unclonable function (BS-PUF)This study is restricted to fog environment
(ii) This study ensures the security of the sensors and fog nodes and to avoid a computational burden on devices

Hassija et al. [24]2021A survey on supply chain security: application areas, security threats, and solution architectures(i) This article discusses the supply chain’s security critical application areas and presents a detailed survey of the security issues in the existing supply chain architectureThis study is a survey work and fails to address the security features and how they can be applied for the AKA protocols
(ii) Various emerging technologies, such as blockchain, machine learning (ML), and physically unclonable functions (PUFs) as solutions to the vulnerabilities in the existing infrastructure of the supply chain