The PUF-based authentication protocol is designed with a two-step process. One is device registration, and the second is authentication or mutual authentication or mutual authentication and key agreement. LWM-Auth also uses the same design method.
For successful mutual authentication, both devices should know the same secret. However, no two or more PUFs with the same physical characteristics can generate the same response. The device registration process solves this issue by sharing secrets with the host PC in a secure environment. After device registration, the devices are deployed in the production environment.
This process is executed whenever the devices need access to the pub network to exchange sensitive data, or the session key needs to be refreshed.
The detailed description of the above protocol is available in this link.
Last Update: 26 Jan 2025