PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS

Mubarak Mehdi, Muhammad Taha Ajani, Hasan Tahir, Shahzaib Tahir, Zahoor Alizai, Fawad Khan, Qaiser Riaz , Mehdi Hussain

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)
1 Downloads (Pure)


Consumer electronics manufacturers have been incorporating support for 4G/5G communication technologies into many electronic devices. Thus, highly capable Internet of Things (IoT)-ready versions of electronic devices are being purchased which will eventually replace traditional consumer electronics. With the goal of creating a smart environment, the IoT devices enable data sharing, sensing, awareness, increased control. Enabled by high-speed networks, the IoT devices function in a group setting thus compounding the attack surface leading to security and privacy concerns. This research is a study on the possibility of incorporating PUF as a basis for group key generation. The challenge here lies in identifying device features that are unique, stable, reproducible and unpredictable by an adversary. Each device generates its own identity leading to collaborative cryptographic key generation in a group setting. The research uses a comprehensive hardware testbed to demonstrate the viability of PUFs for the generation of a symmetric key through collaboration. Detailed analysis of the proposed setup and the symmetric key generation scheme has shown that the system is scalable and offers unrivalled advantages compared to conventional cryptographic implementations.
Original languageEnglish
Article number1691
Number of pages18
Issue number14
Publication statusPublished - 15 Jul 2021
Externally publishedYes

Bibliographical note

Copyright: © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/)


This research has been partially funded by National Center for Cyber Security (NCCS), Pakistan under the project titled “Privacy Preserving Search Over Sensitive Data Stored in the Cloud”.


  • symmetric key
  • cryptography
  • Internet of Things;
  • Physical Unclonable Function (PUF);
  • Group Diffie–Hellman


Dive into the research topics of 'PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS'. Together they form a unique fingerprint.

Cite this