{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:44:47Z","timestamp":1762429487721,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Internet of things (IoTs) is an integration of heterogeneous physical devices which are interconnected and communicated over the physical Internet. The design of secure, lightweight and an effective authentication protocol is required, because the information is transmitted among the remote user and numerous sensing devices over the IoT network. Recently, two-factor authentication (TFA) scheme is developed for providing the security among the IoT devices. But, the performances of the IoT network are affected due to the less memory storage and restricted resource of the IoT. In this paper, the integration of data inverting encoding scheme (DIES) and substitution-box-based inverter is proposed for providing the security using the random values of one-time alias identity, challenge, server nonce and device nonce. Here, the linearity of produced random values is decreased for each clock cycle based on the switching characteristics of the selection line in DIES. Moreover, the linear feedback shift register is used in the adaptive physically unclonable function (APUF) for generating the random response value. The APUF\u2013DIES-IoT architecture is analyzed in terms of lookup table, flip flops, slices, frequency and delay. This APUF\u2013DIES-IoT architecture is analyzed for different security and authentication performances. Two existing methods are considered to evaluate the APUF\u2013DIES-IoT architecture such as TFA-PUF-IoT and TFA-APUF-IoT. The APUF\u2013DIES-IoT architecture uses 36 flip flops at Virtex 6; it is less when compared to the TFA-PUF-IoT and TFA-APUF-IoT.<\/jats:p>","DOI":"10.1007\/s11227-021-04022-w","type":"journal-article","created":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T21:43:58Z","timestamp":1630705438000},"page":"4503-4525","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A low-area design of two-factor authentication using DIES and SBI for IoT security"],"prefix":"10.1007","volume":"78","author":[{"given":"M. N.","family":"Sudha","sequence":"first","affiliation":[]},{"given":"M.","family":"Rajendiran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6026-306X","authenticated-orcid":false,"given":"Mariusz","family":"Specht","sequence":"additional","affiliation":[]},{"given":"Kasarla Satish","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sugumaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,3]]},"reference":[{"key":"4022_CR1","doi-asserted-by":"publisher","first-page":"103357","DOI":"10.1016\/j.micpro.2020.103357","volume":"80","author":"C Pan","year":"2021","unstructured":"Pan C (2021) Design of sports course management system based on Internet of things and FPGA system. Microprocess Microsyst 80:103357","journal-title":"Microprocess Microsyst"},{"issue":"3","key":"4022_CR2","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1108\/IJIUS-06-2019-0029","volume":"9","author":"AF Khan","year":"2020","unstructured":"Khan AF, Anandharaj G (2020) A multi-layer security approach for DDoS detection in Internet of things. Int J Intell Unmanned Syst 9(3):178\u2013191","journal-title":"Int J Intell Unmanned Syst"},{"key":"4022_CR3","doi-asserted-by":"publisher","first-page":"10258","DOI":"10.1007\/s11227-020-03240-y","volume":"76","author":"A Majumder","year":"2020","unstructured":"Majumder A, Saha S, Chakrabarti A (2020) EAAM: energy-aware application management strategy for FPGA-based IoT-Cloud environments. J Supercomput 76:10258\u201310287","journal-title":"J Supercomput"},{"issue":"2","key":"4022_CR4","first-page":"119","volume":"22","author":"AF Khan","year":"2020","unstructured":"Khan AF, Anandharaj G (2020) Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot. Egypt Inf J 22(2):119\u2013124","journal-title":"Egypt Inf J"},{"key":"4022_CR5","doi-asserted-by":"publisher","first-page":"148950","DOI":"10.1109\/ACCESS.2019.2946400","volume":"7","author":"BH Taher","year":"2019","unstructured":"Taher BH, Jiang S, Yassin AA, Lu H (2019) Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction. IEEE Access 7:148950\u2013148966","journal-title":"IEEE Access"},{"key":"4022_CR6","doi-asserted-by":"publisher","first-page":"5849","DOI":"10.1007\/s11227-019-03013-2","volume":"76","author":"S Satpathy","year":"2020","unstructured":"Satpathy S, Mohan P, Das S, Debbarma S (2020) A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA. J Supercomput 76:5849\u20135861","journal-title":"J Supercomput"},{"issue":"1","key":"4022_CR7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1186\/s13638-019-1531-0","volume":"2019","author":"U Farooq","year":"2019","unstructured":"Farooq U, Hasan NU, Baig I, Shehzad N (2019) Efficient adaptive framework for securing the Internet of things devices. EURASIP J Wirel Commun Netw 2019(1):210","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"4022_CR8","unstructured":"Khan AF, Anandharaj G (2021) A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT.\u00a0Wirel Pers Commun, pp. 1\u201311"},{"issue":"11\u201312","key":"4022_CR9","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1007\/s11265-019-01471-8","volume":"91","author":"HK Kim","year":"2019","unstructured":"Kim HK, Sunwoo MH (2019) Low power AES Using 8-bit and 32-bit datapath optimization for small Internet-of-Things (IoT). J Signal Process Syst 91(11\u201312):1283\u20131289","journal-title":"J Signal Process Syst"},{"key":"4022_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8860598","volume":"2020","author":"Youssef W El Hadj","year":"2020","unstructured":"El Hadj Youssef W, Abdelli A, Dridi F, Machhout M (2020) Hardware implementation of secure lightweight cryptographic designs for IoT applications. Secur Commun Netw 2020:1\u201313","journal-title":"Secur Commun Netw"},{"key":"4022_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.aeue.2019.03.006","volume":"105","author":"GDP Stanchieri","year":"2019","unstructured":"Stanchieri GDP, De Marcellis A, Palange E, Faccio M (2019) A true random number generator architecture based on a reduced number of FPGA primitives. AEU Int J Electron Commun 105:15\u201323","journal-title":"AEU Int J Electron Commun"},{"issue":"2","key":"4022_CR12","first-page":"139","volume":"9","author":"AB Ferozkhan","year":"2021","unstructured":"Ferozkhan AB (2021) The embedded framework for securing the Internet of things. J Eng Res 9(2):139\u2013148","journal-title":"J Eng Res"},{"issue":"2","key":"4022_CR13","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s11277-019-06165-9","volume":"106","author":"A Braeken","year":"2019","unstructured":"Braeken A, Liyanage M, Jurcut AD (2019) Anonymous lightweight proxy based key agreement for IoT (ALPKA). Wirel Pers Commun 106(2):345\u2013364","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"4022_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-019-00437-y","volume":"19","author":"H Takase","year":"2020","unstructured":"Takase H, Kobayashi R, Kato M, Ohmura R (2020) A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. Int J Inf Secur 19(1):71\u201381","journal-title":"Int J Inf Secur"},{"issue":"3","key":"4022_CR15","doi-asserted-by":"publisher","first-page":"3563","DOI":"10.1007\/s12652-020-01694-9","volume":"67","author":"A Biswas","year":"2020","unstructured":"Biswas A, Majumdar A, Nath S, Dutta A, Baishnab KL (2020) LRBC: a lightweight block cipher design for resource constrained IoT devices. J Ambient Intell Humaniz Comput 67(3):3563\u20133579. https:\/\/doi.org\/10.1007\/s12652-020-01694-9","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4022_CR16","doi-asserted-by":"publisher","first-page":"102159","DOI":"10.1016\/j.adhoc.2020.102159","volume":"103","author":"CA Lara-Nino","year":"2020","unstructured":"Lara-Nino CA, Diaz-Perez A, Morales-Sandoval M (2020) Lightweight elliptic curve cryptography accelerator for Internet of things applications. Ad Hoc Netw 103:102159","journal-title":"Ad Hoc Netw"},{"key":"4022_CR17","doi-asserted-by":"publisher","first-page":"207610","DOI":"10.1109\/ACCESS.2020.3038219","volume":"8","author":"MOA Al-Shatari","year":"2020","unstructured":"Al-Shatari MOA, Hussin FA, Abd Aziz A, Witjaksono G, Tran XT (2020) FPGA-based lightweight hardware architecture of the PHOTON hash function for IoT edge devices. IEEE Access 8:207610\u2013207618","journal-title":"IEEE Access"},{"key":"4022_CR18","doi-asserted-by":"publisher","first-page":"95978","DOI":"10.1109\/ACCESS.2019.2928768","volume":"7","author":"JM McGinthy","year":"2019","unstructured":"McGinthy JM, Michaels AJ (2019) Further analysis of PRNG-based key derivation functions. IEEE Access 7:95978\u201395986","journal-title":"IEEE Access"},{"issue":"1","key":"4022_CR19","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/JIOT.2018.2861324","volume":"6","author":"A Singh","year":"2018","unstructured":"Singh A, Chawla N, Ko JH, Kar M, Mukhopadhyay S (2018) Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes. IEEE Internet Things J 6(1):421\u2013434","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"4022_CR20","doi-asserted-by":"publisher","first-page":"502","DOI":"10.3390\/mi11050502","volume":"11","author":"WC Chien","year":"2020","unstructured":"Chien WC, Chang YC, Tsou YT, Kuo SY, Chang CR (2020) STT-DPSA: digital PUF-based secure authentication using STT-MRAM for the Internet of things. Micromachines 11(5):502","journal-title":"Micromachines"},{"issue":"12","key":"4022_CR21","doi-asserted-by":"publisher","first-page":"7272","DOI":"10.1109\/TIT.2012.2217072","volume":"58","author":"R Zhang","year":"2012","unstructured":"Zhang R, Sachnev V, Botnan MB, Kim HJ, Heo J (2012) An efficient embedder for BCH coding for steganography. IEEE Trans Inf Theory 58(12):7272\u20137279","journal-title":"IEEE Trans Inf Theory"},{"issue":"12","key":"4022_CR22","doi-asserted-by":"publisher","first-page":"2280","DOI":"10.1587\/transfun.E101.A.2280","volume":"101","author":"T Manabe","year":"2018","unstructured":"Manabe T, Shibata Y, Oguri K (2018) FPGA implementation of a real-time super-resolution system using flips and an RNS-based CNN. IEICE Trans Fundam Electron Commun Comput Sci 101(12):2280\u20132289","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"4022_CR23","doi-asserted-by":"publisher","first-page":"163419","DOI":"10.1109\/ACCESS.2020.3020262","volume":"8","author":"D Zoni","year":"2020","unstructured":"Zoni D, Galimberti A, Fornaciari W (2020) Efficient and scalable FPGA-oriented design of QC-LDPC bit-flipping decoders for post-quantum cryptography. IEEE Access 8:163419\u2013163433","journal-title":"IEEE Access"},{"issue":"5","key":"4022_CR24","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","volume":"4","author":"MN Aman","year":"2017","unstructured":"Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J 4(5):1327\u20131340","journal-title":"IEEE Internet Things J"},{"key":"4022_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/5989151","volume":"2017","author":"R Amin","year":"2017","unstructured":"Amin R, Islam SK, Khan MK, Karati A, Giri D, Kumari S (2017) A two-factor RSA-based robust authentication system for multiserver environments. Secur Commun Netw 2017:1\u201315","journal-title":"Secur Commun Netw"},{"key":"4022_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/423930","volume":"2014","author":"J Qu","year":"2014","unstructured":"Qu J, Tan XL (2014) Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. J Elect Comput Eng 2014:1\u20136","journal-title":"J Elect Comput Eng"},{"issue":"6","key":"4022_CR27","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TIFS.2017.2659640","volume":"12","author":"Q Xie","year":"2017","unstructured":"Xie Q, Wong DS, Wang G, Tan X, Chen K, Fang L (2017) Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model. IEEE Trans Inf Forensics Secur 12(6):1382\u20131392","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"4022_CR28","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580\u2013589","journal-title":"IEEE Internet Things J"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04022-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04022-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04022-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T13:28:03Z","timestamp":1644240483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04022-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,3]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["4022"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04022-w","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2021,9,3]]},"assertion":[{"value":"9 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}