Skip to main content
. 2020 Aug 5;20(16):4361. doi: 10.3390/s20164361

Table 3.

Comparison of the cyber defense capabilities of our proposed mutual authentication mechanism and the most recent PUF-based mutual authentication methods.

Security Feature Mughal et al. [6] Aman et al. [1] Alizai et al. [7] Han and Kim [8] Xu et al. [32] Banerjee et al. [33] Proposed Mechanism
Utilized security algorithms PUF and Encryption and Hash algorithms PUF and Encryption and Hash algorithms Functional Operation and Encryption and Hash Encryption (Block Cipher algorithm) PUF and Encryption PUF and Hash algorithm and XOR operation PUF and Hash algorithm
Number of security methods used 3 3 3 1 2 3 2
Two-Factor Authentication Yes No Yes No No Yes Yes
Resilience to replay attack No No Yes No Yes Yes Yes
Resilience to machine learning attack No Yes No N/A N/A N/A N/A
Resilience to Man–in-the-middle attack No No No No Yes Yes Yes
Resilience to invasive attack Yes Yes N/A N/A Yes Yes Yes
Resilience to firmware attack No Yes No No No No Yes
Resilience to spoofing attack No Yes No No Yes Yes Yes
Resilience to eavesdropping attack No Yes No No Yes Yes Yes