Table 3.
Comparison of the cyber defense capabilities of our proposed mutual authentication mechanism and the most recent PUF-based mutual authentication methods.
Security Feature | Mughal et al. [6] | Aman et al. [1] | Alizai et al. [7] | Han and Kim [8] | Xu et al. [32] | Banerjee et al. [33] | Proposed Mechanism |
---|---|---|---|---|---|---|---|
Utilized security algorithms | PUF and Encryption and Hash algorithms | PUF and Encryption and Hash algorithms | Functional Operation and Encryption and Hash | Encryption (Block Cipher algorithm) | PUF and Encryption | PUF and Hash algorithm and XOR operation | PUF and Hash algorithm |
Number of security methods used | 3 | 3 | 3 | 1 | 2 | 3 | 2 |
Two-Factor Authentication | Yes | No | Yes | No | No | Yes | Yes |
Resilience to replay attack | No | No | Yes | No | Yes | Yes | Yes |
Resilience to machine learning attack | No | Yes | No | N/A | N/A | N/A | N/A |
Resilience to Man–in-the-middle attack | No | No | No | No | Yes | Yes | Yes |
Resilience to invasive attack | Yes | Yes | N/A | N/A | Yes | Yes | Yes |
Resilience to firmware attack | No | Yes | No | No | No | No | Yes |
Resilience to spoofing attack | No | Yes | No | No | Yes | Yes | Yes |
Resilience to eavesdropping attack | No | Yes | No | No | Yes | Yes | Yes |