Comparative analysis of PUF-based secure authentication protocols
With the popularization of the digitalization and the Internet,security and privacy protection have become important concerns.As a hardware-based security mechanism,Physical Unclonable Func-tion(PUF)provides a new approach for the identity authentication.In this paper,types and character-istics of PUF-based secure authentication protocols are summarized,which are classified into two types of weak PUF-based and strong PUF-based respectively.Comparative analysis is conducted in terms of type and performance.Meanwhile,security capabilities of different secure authentication protocols are compared and security risk faced by each protocol is revealed.Finally,application prospect of PUF-based secure authentication protocol is deeply discussed.Challenges and solutions are explored,and trend and prospect for future development are also depicted.