References
- Chen, S., Li, B., Chen, Z., Zhang, Y., Wang, C., Tao, C., "Novel Strong-PUF-based Authentication Protocols Leveraging Shamir's Secret Sharing" IEEE Internet of Things Journal, 2021.
- Mahabub Hasan Mahalat, Dipankar Karmakar, Anindan Mondal, Bibhash Sen, "PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network", ACM Journal on Emerging Technologies in Computing Systems, Vol. 18, No. 9, pp. 1-23, 2022.
- Adi Shamir, "How to share a secret", Lecture Notes in Computer Science, pp. 371-375, 1983.
- G. R. Blakley, "Safeguarding cryptographic keys", Proceeding of the 1979 AFIPS National Computer Conference, 1979.
- P. Feldman, "A practical scheme for non-interactive verifiable secret sharing", IEEE Symposium on Foundations of Computer Science, pp. 427-437, 1987.
- T. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing", CRYPTO 1991, pp. 129-140, 1991.
- S. Zhu, S. Setia, and S. Jajodia, LEAP : Efficient Security Mechanism for Large-Scale distributed Sensor Networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security(CCS '03), Washington D.C, Oct, 2003.
- Verma, Rakesh M., and Bailey E. Basile. "Modeling and analysis of LEAP, a key management protocol for wireless sensor networks." Security and Privacy of Mobile, Wireless, and Sensor Networks (MWSN), 2013 IEEE International Workshop on. IEEE, 2013.
- I. Chuang, W. Su, C. Wu, J. HSu and Y. Kou, "Two-layered Dynamic Key Management in Mobile and Long-lived Cluster-based Wireless Sensor Networks", in Prpceedings of IEEE Wireless Communications and Networking Conference, pp.4145-4150, 2007.
- L. Eschenauer and V. Gligor, "A Key Management Scheme for Distributed Sensor Networks," in the Proceedings of the 9th ACM Conference on Computing and Communication Security, 2002
- L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Mag., vol. 13, no.6, Nov./Dec. 1999, pp. 24-30, 1999.
- A. Herzberg et al., "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Proc. Crypto'95, pp. 339-352, 1995.
- J. Kong et al., "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks", Proc. 9th Int'l. Conf. Network Protocols (ICNP'01), pp. 251-260, 2001.
- S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks", IEEE Trans. Mobile Computing, vol. 2, no.1, pp. 1-13, 2003.
- Baek. Jong-Hak, Sin. Gwang-Jo, "Development and Application of Security Chip Technology Using PUF Technology", The Magazine of the IEIE, Vol. 43, No. 7, pp. 59-67, 2016.
- Sumin Kim, "A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environment," Journal of Information and Security, Vol. 19, No. 5, pp. 107-118, 2019.
- Arun Sekar Rajasekaran, Azees Maria, Fadi Al-Turjman, Chadi Altrjman, Leonardo Mostarda, "Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET", Drones 6, No.1: 14, 2022.
- N.N.Shenets, "Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption", Automatic Control and Computer Science, Vol. 53, No. 8, 2019.
- Wenliang Du, "An Efficient Scheme for Authenticating Public Keys in Sensor Networks", 6th ACMInternational Symposium, 2005.
- R. Merkle, "Protocols for Public Key Cryptosystems", In Proceedings of the IEEE Symposium on Research in Security and Privacy, Apr 1980.