To see the other types of publications on this topic, follow the link: PUF Physically imcloneable function.

Journal articles on the topic 'PUF Physically imcloneable function'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'PUF Physically imcloneable function.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Chattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, and Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability." ACM Transactions on Design Automation of Electronic Systems 26, no. 6 (2021): 1–24. http://dx.doi.org/10.1145/3460004.

Full text
Abstract:
Physically Unclonable Function (PUF) circuits are promising low-overhead hardware security primitives, but are often gravely susceptible to machine learning–based modeling attacks. Recently, chaotic PUF circuits have been proposed that show greater robustness to modeling attacks. However, they often suffer from unacceptable overhead, and their analog components are susceptible to low reliability. In this article, we propose the concept of a conditionally chaotic PUF that enhances the reliability of the analog components of a chaotic PUF circuit to a level at par with their digital counterparts
APA, Harvard, Vancouver, ISO, and other styles
2

Zheng, Yujin, Alex Yakovlev, and Alex Bystrov. "A Power-Gated 8-Transistor Physically Unclonable Function Accelerates Evaluation Speeds." Journal of Low Power Electronics and Applications 13, no. 4 (2023): 53. http://dx.doi.org/10.3390/jlpea13040053.

Full text
Abstract:
The proposed 8-Transistor (8T) Physically Unclonable Function (PUF), in conjunction with the power gating technique, can significantly accelerate a single evaluation cycle more than 100,000 times faster than a 6-Transistor (6T) Static Random-Access Memory (SRAM) PUF. The 8T PUF is built to swiftly eliminate data remanence and maximise physical mismatch. Moreover, a two-phase power gating module is devised to provide controllable power on/off cycles for the chosen PUF clusters in order to facilitate fast statistical measurements and curb the in-rush current. The architecture andhardware impleme
APA, Harvard, Vancouver, ISO, and other styles
3

Komano, Yuichi, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede. "Single-Round Pattern Matching Key Generation Using Physically Unclonable Function." Security and Communication Networks 2019 (January 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/1719585.

Full text
Abstract:
Paral and Devadas introduced a simple key generation scheme with a physically unclonable function (PUF) that requires no error correction, e.g., by using a fuzzy extractor. Their scheme, called a pattern matching key generation (PMKG) scheme, is based on pattern matching between auxiliary data, assigned at the enrollment in advance, and a substring of PUF output, to reconstruct a key. The PMKG scheme repeats a round operation, including the pattern matching, to derive a key with high entropy. Later, to enhance the efficiency and security, a circular PMKG (C-PMKG) scheme was proposed. However,
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Sangjae, Mi-Kyung Oh, Yousung Kang, and Dooho Choi. "Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices." Sensors 20, no. 2 (2020): 404. http://dx.doi.org/10.3390/s20020404.

Full text
Abstract:
Keeping IoT devices secure has been a major challenge recently. One of the possible solutions to secure IoT devices is to use a physically unclonable function (PUF). A PUF is a security primitive that can generate device-specific cryptographic information by extracting the features of hardware uncertainty. Because PUF instances are very difficult to replicate even by the manufacturer, the generated bit sequence can be used as cryptographic keys or as a unique identifier for the device. Regarding the implementation of PUF, the majority of PUFs introduced over the past decade are in the form of
APA, Harvard, Vancouver, ISO, and other styles
5

Ivaniuk, A. A. "Investigation of the physically unclonable function of a configurable ring oscillator." Informatics 22, no. 1 (2025): 73–89. https://doi.org/10.37661/1816-0301-2025-22-1-73-89.

Full text
Abstract:
Objectives. Design and implementation features of a Physically Unclonable Function (PUF) based on a Configurable Ring Oscillator (CRO) on FPGA platforms are examined. The study aims to evaluate the key parameters of CRO circuits and the characteristics of CRO-based PUFs under various simulation scenarios and placement configurations on FPGA dies.Methods. Methods of synthesis and analysis of digital devices are employed, including those based on programmable logic integrated circuits, as well as the fundamentals of digital circuit design.Results. A generalized model of a PUF based on the compar
APA, Harvard, Vancouver, ISO, and other styles
6

Lapidas, V., A. Zhizhchenko, E. Pustovalov, D. Storozhenko, and A. Kuchmizhak. "Direct laser printing of high-resolution physically unclonable function anti-counterfeit labels." Applied Physics Letters 120, no. 26 (2022): 261104. http://dx.doi.org/10.1063/5.0091213.

Full text
Abstract:
Security labels combining facile structural color readout and physically unclonable one-way function (PUF) approach provide promising strategy for fighting against forgery of marketable products. Here, we justify direct femtosecond-laser printing, a simple and scalable technology, for fabrication of high-resolution (12 500 dots per inch) and durable PUF labels with a substantially large encoding capacity of 10895 and a simple spectroscopy-free optical signal readout. The proposed tags are comprised of laser-printed plasmonic nanostructures exhibiting unique light scattering behavior and unclon
APA, Harvard, Vancouver, ISO, and other styles
7

Ivaniuk, A. A., and A. Y. Shamyna. "Physically non-cloneable arbiter -type function with non-linear path pairs." «System analysis and applied information science», no. 1 (August 2, 2023): 54–62. http://dx.doi.org/10.21122/2309-4923-2023-1-54-62.

Full text
Abstract:
Physically unclonable functions (PUFs) are basic physical cryptographical primitives, providing to solve tasks such as unclonable identification, digital device authentication and copyright authentication, true random sequence generation, etc. The major features of PUFs are stability, unpredictability and irreproducibility, due to uncontrollable random variations of distinctive features of the raw materials and technological processes used during their manufacturing. Generally, PUF are digital circuits that extract such variations and convert them into a binary format, which applied for furthe
APA, Harvard, Vancouver, ISO, and other styles
8

Watanabe, Yuichi, Kouji Suemori, Kazunori Kuribara, Nobuko Fukuda, Ken-ichi Nomura, and Sei Uemura. "Development of a simple contact-type printable physically unclonable function device using percolation conduction of rod-like conductive fillers." Japanese Journal of Applied Physics 61, SE (2022): SE1005. http://dx.doi.org/10.35848/1347-4065/ac506b.

Full text
Abstract:
Abstract We suggested a printable physically unclonable function (PUF) with a simple circuit structure, to provide a low-cost PUF for improvement in the security level of electronic devices. An element of our contact-type printable PUF was constructed of a conductive filler layer and a pair of electrodes formed by printing. The contact-type printable PUF was based on an open- or short-circuit information of elements induced by a percolation conduction phenomenon of the conductive filler layer. An average conduction probability of the elements could be controlled by adjusting the manufacturing
APA, Harvard, Vancouver, ISO, and other styles
9

Okura, Shunsuke, Masanori Aoki, Tatsuya Oyama, et al. "Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor." Sensors 21, no. 18 (2021): 6079. http://dx.doi.org/10.3390/s21186079.

Full text
Abstract:
In order to realize image information security starting from the data source, challenge–response (CR) device authentication, based on a Physically Unclonable Function (PUF) with a 2 Mpixel CMOS image sensor (CIS), is studied, in which variation of the transistor in the pixel array is utilized. As each CR pair can be used only once to make the CIS PUF resistant to the modeling attack, CR authentication with CIS can be carried out 4050 times, with basic post-processing to generate the PUF ID. If a larger number of authentications is required, advanced post-processing using Lehmer encoding can be
APA, Harvard, Vancouver, ISO, and other styles
10

Kuribara, Kazunori, Yuichi Watanabe, Atsushi Takei, Sei Uemura, and Manabu Yoshida. "Robustness of organic physically unclonable function with buskeeper circuit for flexible security devices." Japanese Journal of Applied Physics 61, SE (2022): SE1016. http://dx.doi.org/10.35848/1347-4065/ac4c6a.

Full text
Abstract:
Abstract Flexible devices have been studied to realize IoT or novel wearable devices. The data that flexible devices deal with can include personal information when application areas further expand. A security system for flexible devices becomes more important in this case. In this study, we investigate the thermal stability of an organic flexible security system. The security system utilizes fabrication variation of a chip, and it is called a physically unclonable function (PUF). As a result, the bit error rate of the organic PUF is 1.8% and the index of ID uniqueness (i.e., randomness) has a
APA, Harvard, Vancouver, ISO, and other styles
11

Abdolinezhad, Saeed, Lukas Zimmermann, and Axel Sikora. "A Novel Key Generation Method for Group-Based Physically Unclonable Function Designs." Electronics 10, no. 21 (2021): 2597. http://dx.doi.org/10.3390/electronics10212597.

Full text
Abstract:
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization prob
APA, Harvard, Vancouver, ISO, and other styles
12

Huang, Zhao, Liang Li, Yin Chen, Zeyu Li, Quan Wang, and Xiaohong Jiang. "RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices." Electronics 10, no. 23 (2021): 3039. http://dx.doi.org/10.3390/electronics10233039.

Full text
Abstract:
With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. It utilizes the inherent nature of hardware to generate a random and unpredictable fingerprint to uniquely identify an IoT device. However, despite existing PUFs having exhibited a good performance, th
APA, Harvard, Vancouver, ISO, and other styles
13

Khan, Mohammad Nasim Imtiaz, Chak Yuen Cheng, Sung Hao Lin, Abdullah Ash-Saki, and Swaroop Ghosh. "A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory." Journal of Low Power Electronics and Applications 11, no. 1 (2021): 5. http://dx.doi.org/10.3390/jlpea11010005.

Full text
Abstract:
We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG). The PUF realized by manipulating the write time and the TRNG is realized by tweaking the number of write pulses. Our analysis indicates that more than 75% bits in the PUF are unusable without any correction due to their inability to exhibit any randomness. We exploit temporal randomness of working columns to fix the unusable columns and write latency to fix the unusable rows during the enrollment. The intra-HD, inter-HD, energy, bandwidth
APA, Harvard, Vancouver, ISO, and other styles
14

Della Sala, Riccardo, Davide Bellizia, Francesco Centurelli, and Giuseppe Scotti. "A Monostable Physically Unclonable Function Based on Improved RCCMs with 0–1.56% Native Bit Instability at 0.6–1.2 V and 0–75 °C." Electronics 12, no. 3 (2023): 755. http://dx.doi.org/10.3390/electronics12030755.

Full text
Abstract:
In this work, a Physically Unclonable Function (PUF) based on an improved regulated cascode current mirror (IRCCM) is presented. The proposed IRCCM improves the loop-gain of the gain-boosting branch over the conventional RCCM PUF, thereby increasing the output resistance and amplifying the mismatches due to random variations. The introduction of an explicit reference current in the biasing branch of the IRCCM results in lower native unstable bits, good robustness against environmental variations and very stable power consumption. The proposed PUF has been validated through measurement results
APA, Harvard, Vancouver, ISO, and other styles
15

Hu, Shuang, Pengjun Wang, Haonan He, Yuejun Zhang, and Xiangyu Li. "Gas Sensor Physically Unclonable Function-Based Lightweight Bidirectional Authentication Protocol for Gas Sensor Networks." Electronics 13, no. 17 (2024): 3385. http://dx.doi.org/10.3390/electronics13173385.

Full text
Abstract:
In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonable functions (GS-PUFs) with authentication technology to guarantee the reliability of data from sensor nodes. A sensor PUF array is constructed by preparing gas sensors to enhance the data security of the physical layer and reduce hardware resource consumption. The authentication part of the protocol mainly uses lightweight encryption methods, consi
APA, Harvard, Vancouver, ISO, and other styles
16

Julius, Han Loong Teo, Alia Noor Hashim Noor, Ghazali Azrul, and Azlee Hamid Fazrena. "Configurations of memristor-based APUF for improved performance." Bulletin of Electrical Engineering and Informatics 8, no. 1 (2019): 74–82. https://doi.org/10.11591/eei.v8i1.1401.

Full text
Abstract:
The memristor-based arbiter PUF (APUF) has great potential to be used for hardware security purposes. Its advantage is in its challenge-dependent delays, which cannot be modeled by machine learning algorithms. In this paper, further improvement is proposed, which are circuit configurations to the memristor-based APUF. Two configuration aspects were introduced namely varying the number of memristor per transistor, and the number of challenge and response bits. The purpose of the configurations is to introduce additional variation to the PUF, thereby improve PUF performance in terms of uniquenes
APA, Harvard, Vancouver, ISO, and other styles
17

Al-Ani, Hussien, and Israa Al-Mashhadani. "Memristive-Based Physical Unclonable Function Design of Authentication Architectures: A Systematic Review." Mesopotamian Journal of CyberSecurity 4, no. 2 (2024): 88–105. http://dx.doi.org/10.58496/mjcs/2024/009.

Full text
Abstract:
Physically unclonable functions (PUFs) are advanced physical security measures that offer fundamental, unclonable appraisals of physical objects, providing an effective defense against hardware vulnerability breaches. They function as unique digital hardware fingerprints. This study discusses previous methods adopted for improving hardware security via PUF technology, with a specific focus on PUF circuits implemented on FPGA boards. Hardware security is assumed to be enhanced by adding a memristor to the ring oscillator PUF circuit and implementing these authentication architectures on FPGA bo
APA, Harvard, Vancouver, ISO, and other styles
18

Asghari, Meysam, Marino Guzman, and Nima Maghari. "Cross-Coupled Impedance-Based Physically Unclonable Function (PUF) With 1.06% Native Instability." IEEE Solid-State Circuits Letters 3 (2020): 282–85. http://dx.doi.org/10.1109/lssc.2020.3012546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sun, Da-Zhi, Yi-Na Gao, and Yangguang Tian. "On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices." Sensors 23, no. 14 (2023): 6559. http://dx.doi.org/10.3390/s23146559.

Full text
Abstract:
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in
APA, Harvard, Vancouver, ISO, and other styles
20

Bin Tarik, Farhan, Azadeh Famili, Yingjie Lao, and Judson D. Ryckman. "Robust optical physical unclonable function using disordered photonic integrated circuits." Nanophotonics 9, no. 9 (2020): 2817–28. http://dx.doi.org/10.1515/nanoph-2020-0049.

Full text
Abstract:
AbstractPhysical unclonable function (PUF) has emerged as a promising and important security primitive for use in modern systems and devices, due to their increasingly embedded, distributed, unsupervised, and physically exposed nature. However, optical PUFs based on speckle patterns, chaos, or ‘strong’ disorder are so far notoriously sensitive to probing and/or environmental variations. Here we report an optical PUF designed for robustness against fluctuations in optical angular/spatial alignment, polarization, and temperature. This is achieved using an integrated quasicrystal interferometer (
APA, Harvard, Vancouver, ISO, and other styles
21

Kurtoglu, Abdullah, Amir H. M. Shirazi, Shahriar Mirabbasi, and Hossein Miri Lavasani. "A Low-Power, 65 nm 24.6-to-30.1 GHz Trusted LC Voltage-Controlled Oscillator Achieving 191.7 dBc/Hz FoM at 1 MHz." Journal of Low Power Electronics and Applications 14, no. 1 (2024): 10. http://dx.doi.org/10.3390/jlpea14010010.

Full text
Abstract:
This work presents a novel trusted LC voltage-controlled oscillator (VCO) with an embedded compact analog Physically Unclonable Function (PUF) used for authentication. The trusted VCO is implemented in a 1P9M 65 nm standard CMOS process and consumes 1.75 mW. It exhibits a measured phase noise (PN) of −104.8 dBc/Hz @ 1 MHz and −132.2 dBc/Hz @ 10 MHz offset, resulting in Figures of Merit (FoMs) of 191.7 dBc/Hz and 199.1 dBc/Hz, respectively. With the measured frequency tuning range (TR) of ~5.5 GHz, the FoM with tuning (FoMT) reaches 197.6 dBc/Hz and 205.0 dBc/Hz at 1 MHz and 10 MHz offset, resp
APA, Harvard, Vancouver, ISO, and other styles
22

Perumalla, Anvesh, and John M. Emmert. "Memometer: Memory PUF-based Hardware Metering Methodology for FPGAs." EDFA Technical Articles 24, no. 4 (2022): 12–21. http://dx.doi.org/10.31399/asm.edfa.2022-4.p012.

Full text
Abstract:
Abstract This article describes a hardware metering fingerprint technique, called the memometer, that addresses supply chain integrity issues with field-programmable gate arrays (FPGAs). The memometer is a physically unclonable function (PUF) based on cross-coupled lookup tables that overcomes manufacturing memory power-on preset. The fingerprints are not only unique, but also reliable with average hamming distances close to the ideal values of 50% (interchip) and 0% (intrachip). Instead of having one fingerprint per device, the memometer makes provision for hundreds with the potential for mor
APA, Harvard, Vancouver, ISO, and other styles
23

Lin, Yu-Hsuan, Dai-Ying Lee, Ming-Hsiu Lee, et al. "A novel 1T2R self-reference physically unclonable function suitable for advanced logic nodes for high security level applications." Japanese Journal of Applied Physics 61, SC (2022): SC1003. http://dx.doi.org/10.35848/1347-4065/ac3a8d.

Full text
Abstract:
Abstract A self-reference resistive random-access memory (ReRAM)-based one-transistor, two-ReRAM (1T2R) physically unclonable function (PUF) is proposed to provide a hardware security feature for electrical products in the IoT/5G era. There are four advantages from the proposed structure: (1) a small cell size; (2) intrinsic randomness; (3) no programming circuit; and (4) no data retention concerns. The conduction mechanism, temperature dependency, and read fluctuation of the pristine ReRAM device are studied. An information–address separation scheme is proposed which not only reduces the impa
APA, Harvard, Vancouver, ISO, and other styles
24

Sun, Da-Zhi, and Yangguang Tian. "Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices." Mathematics 10, no. 22 (2022): 4310. http://dx.doi.org/10.3390/math10224310.

Full text
Abstract:
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the session key. Our findings are in the following. First, Zerrouki et al.’s PUF protoco
APA, Harvard, Vancouver, ISO, and other styles
25

Boikov, Konstantin A. "Radiosensor identification and authentication of radio-electronic devices." T-Comm 16, no. 5 (2022): 15–20. http://dx.doi.org/10.36724/2072-8735-2022-16-5-15-20.

Full text
Abstract:
The presented work is devoted to the study of a new physically unclonable function (PUF) associated with the intrinsic electromagnetic radiation of a radio electronic device. This PUF arises as a result of the technological spread of the parameters of electronic components. The relevance of this study is explained by the fact that modern methods of protecting radio-electronic products from illegal cloning have a number of serious drawbacks associated with increased power consumption, the use of processor time, and the need for galvanic access to the object of study. Partially, these problems a
APA, Harvard, Vancouver, ISO, and other styles
26

Kim, Bruce, and Sang-Bock Cho. "A Secure Tunable LNA Design for Internet of Things." International Symposium on Microelectronics 2017, no. 1 (2017): 000705–8. http://dx.doi.org/10.4071/isom-2017-thp22_138.

Full text
Abstract:
Abstract This paper describes the design of through-silicon via (TSV)-based inductors for a secure tunable low-noise amplifier (LNA) in Internet of Things (IoT) devices. To improve cybersecurity infrastructure, we designed a tunable LNA with hardware security. Our secure design for tunable LNA uses a ring oscillator-based physically unclonable function (PUF) circuit. For the 3D inductors, we use ferromagnetic materials to achieve high inductance with a good quality factor.
APA, Harvard, Vancouver, ISO, and other styles
27

Lalouani, Wassila, Mohamed Younis, Mohammad Ebrahimabadi, and Naghmeh Karimi. "Countering Modeling Attacks in PUF-based IoT Security Solutions." ACM Journal on Emerging Technologies in Computing Systems 18, no. 3 (2022): 1–28. http://dx.doi.org/10.1145/3491221.

Full text
Abstract:
Hardware fingerprinting has emerged as a viable option for safeguarding IoT devices from cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices but also to derive cryptographic keys for ensuring data integrity and confidentiality. A Physically Unclonable Function (PUF) is deemed as an effective fingerprinting mechanism for resource-constrained IoT devices since it is simple to implement and imposes little overhead. A PUF design is realized based on the unintentional variations of microelectronics manufacturing processes. When queried with input bits (chall
APA, Harvard, Vancouver, ISO, and other styles
28

Kumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.

Full text
Abstract:
A very important part of any software or hardware associated with the Internet of Things (IoT) is the User Access Control. User Access Control deals with the important security features like authenticating a legitimate user, authorizing a user, etc. A very effective and secure way to ensure the user access control is: three factor user access control. Some three factor user authentication schemes have been developed in the past, brief details regarding them can be found in further sections of the paper. In this paper, we propose a new three factor user access control scheme. Our proposed schem
APA, Harvard, Vancouver, ISO, and other styles
29

Tkach, A., M. Rider, I. Kaliya, K. Strelkova, and K. Bogdanov. "Developing Multi-Modal Anti-Counterfeiting Systems with Randomized Whispering Gallery Mode Active Microresonators." Journal of Physics: Conference Series 2978, no. 1 (2025): 012005. https://doi.org/10.1088/1742-6596/2978/1/012005.

Full text
Abstract:
Abstract Counterfeiting presents critical global challenges, demanding advanced anti-counterfeiting technologies. This study introduces a scalable optical physically unclonable function (PUF) system based on whispering-gallery mode (WGM) resonators formed by polystyrene microspheres coated with AgInS2/ZnS quantum dots (QDs). The system leverages geometric variations in microspheres’ features to generate unique spectral signatures for secure optical identifiers. While the fabrication process allows control over the average size of the microspheres and the emission band of the QDs, the precise p
APA, Harvard, Vancouver, ISO, and other styles
30

Aarella, Seema G., Venkata P. Yanambaka, Saraju P. Mohanty, and Elias Kougianos. "Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing." Future Internet 17, no. 7 (2025): 272. https://doi.org/10.3390/fi17070272.

Full text
Abstract:
This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptogra
APA, Harvard, Vancouver, ISO, and other styles
31

Mahalat, Mahabub Hasan, Dipankar Karmakar, Anindan Mondal, and Bibhash Sen. "PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (2022): 1–23. http://dx.doi.org/10.1145/3466682.

Full text
Abstract:
The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploiting the unique inherent randomness of a device. In this article, we have proposed an
APA, Harvard, Vancouver, ISO, and other styles
32

Mondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally, and Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol." ACM Transactions on Embedded Computing Systems 22, no. 5s (2023): 1–23. http://dx.doi.org/10.1145/3609104.

Full text
Abstract:
Remote attestation is a request-response based security service that permits a trusted entity (verifier) to check the current state of an untrusted remote device (prover). The verifier initiates the attestation process by sending an attestation challenge to the prover; the prover responds with its current state, which establishes its trustworthiness. Physically Unclonable Function (PUF) offers an attractive choice for hybrid attestation schemes owing to its low overhead security guarantees. However, this comes with the limitation of secure storage of the PUF model or large challenge-response d
APA, Harvard, Vancouver, ISO, and other styles
33

Arcenegui, Javier, Rosario Arjona, Roberto Román, and Iluminada Baturone. "Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs." Sensors 21, no. 9 (2021): 3119. http://dx.doi.org/10.3390/s21093119.

Full text
Abstract:
Non-fungible tokens (NFTs) are widely used in blockchain to represent unique and non-interchangeable assets. Current NFTs allow representing assets by a unique identifier, as a possession of an owner. The novelty introduced in this paper is the proposal of smart NFTs to represent IoT devices, which are physical smart assets. Hence, they are also identified as the utility of a user, they have a blockchain account (BCA) address to participate actively in the blockchain transactions, they can establish secure communication channels with owners and users, and they operate dynamically with several
APA, Harvard, Vancouver, ISO, and other styles
34

Julius, Han Loong Teo, Alia Nor Hashim Noor, Ghazali Azrul, and Azlee Hamid Fazrena. "Ring oscillator physically unclonable function using sequential ring oscillator pairs for more challenge-response-pairs." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 892–901. https://doi.org/10.11591/ijeecs.v13.i3.pp892-901.

Full text
Abstract:
The ring oscillator physically unclonable function (ROPUF) is one of the several types of PUF that has great potential to be used for security purposes. An alternative ROPUF design is proposed with two major differences. Firstly, the memristor is included in the ring oscillators as it is claimed to produce a more random oscillation frequency. Other reasons are its memorylike properties and variable memristance, relative compatibility with CMOS, and small size. Secondly, a different method of generating the response is implemented whereby a sequence of selection of ring oscillator pairs are use
APA, Harvard, Vancouver, ISO, and other styles
35

Loong Teo, Julius Han, Noor Alia Nor Hashim, Azrul Ghazali, and Fazrena Azlee Hamid. "Ring oscillator physically unclonable function using sequential ring oscillator pairs for more challenge-response-pairs." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 892. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp892-901.

Full text
Abstract:
<span>The ring oscillator physically unclonable function (ROPUF) is one of the several types of PUF that has great potential to be used for security purposes. An alternative ROPUF design is proposed with two major differences. Firstly, the memristor is included in the ring oscillators as it is claimed to produce a more random oscillation frequency. Other reasons are its memory-like properties and variable memristance, relative compatibility with CMOS, and small size. Secondly, a different method of generating the response is implemented whereby a sequence of selection of ring oscillator
APA, Harvard, Vancouver, ISO, and other styles
36

Smirnov, Alexander, Mikhail Yarovikov, Ekaterina Zhdanova, Alexander Gutor, and Mikhail Vyatkin. "An Optical-Fiber-Based Key for Remote Authentication of Users and Optical Fiber Lines." Sensors 23, no. 14 (2023): 6390. http://dx.doi.org/10.3390/s23146390.

Full text
Abstract:
We have shown the opportunity to use the unique inhomogeneities of the internal structure of an optical fiber waveguide for remote authentication of users or an optic fiber line. Optical time domain reflectometry (OTDR) is demonstrated to be applicable to observing unclonable backscattered signal patterns at distances of tens of kilometers. The physical nature of the detected patterns was explained, and their characteristic spatial periods were investigated. The patterns are due to the refractive index fluctuations of a standard telecommunication fiber. We have experimentally verified that the
APA, Harvard, Vancouver, ISO, and other styles
37

HIROMOTO, Masayuki, Motoki YOSHINAGA, and Takashi SATO. "MRO-PUF: Physically Unclonable Function with Enhanced Resistance against Machine Learning Attacks Utilizing Instantaneous Output of Ring Oscillator." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 7 (2018): 1035–44. http://dx.doi.org/10.1587/transfun.e101.a.1035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Afghah, Fatemeh, Bertrand Cambou, Masih Abedini, and Sherali Zeadally. "A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks." International Journal of Wireless Information Networks 25, no. 2 (2018): 117–29. http://dx.doi.org/10.1007/s10776-018-0391-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mo, Jiaqing, Zhihua Zhang, and Yuhua Lin. "A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF." Electronics 14, no. 1 (2024): 10. https://doi.org/10.3390/electronics14010010.

Full text
Abstract:
In a distributed wireless sensor network (DWSN), sensors continuously perceive the environment, collect data, and transmit it to remote users through the network so as to realize real-time monitoring of the environment or specific targets. However, given the openness of wireless channels and the sensitivity of collecting data, designing a robust user authentication protocol to ensure the legitimacy of user and sensors in such DWSN environments faces serious challenges. Most of the current authentication schemes fail to meet some important and often overlooked security features, such as resisti
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Hyang Jin, Sangjin Kook, Keunok Kim, et al. "Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine." Sensors 25, no. 9 (2025): 2894. https://doi.org/10.3390/s25092894.

Full text
Abstract:
Medical Internet of Things (IoT) systems are crucial in monitoring the health status of patients. Recently, telemedicine services that manage patients remotely by receiving real-time health information from IoT devices attached to or carried by them have experienced significant growth. A primary concern in medical IoT services is ensuring the security of transmitted information and protecting patient privacy. To address these challenges, various authentication schemes have been proposed. We analyze the authentication scheme by Wang et al. and identified several limitations. Specifically, an at
APA, Harvard, Vancouver, ISO, and other styles
41

Yiming Chen, Yiming Chen, Hongjun Duan Yiming Chen, Dong Wang Hongjun Duan, Yining Liu Dong Wang, and Chin-Chen Chang Yining Liu. "SERDA: Secure Enhanced and Robust Data Aggregation Scheme for Smart Grid." 電腦學刊 35, no. 5 (2024): 073–90. http://dx.doi.org/10.53106/199115992024103505006.

Full text
Abstract:
<p>Data aggregation is considered a viable security and privacy solution for smart grid as it allows to obtain the total electricity consumption within a region without disclosing individual data. However, existing data aggregation schemes give little consideration in their threat models to use cases where devices operate in untrustworthy environments and adversaries have physical system access, which is common in the smart grid. They cannot support authentication and resist physical attacks while maintaining data privacy and supporting fault tolerance for smart meter (SM) failures. Moti
APA, Harvard, Vancouver, ISO, and other styles
42

Rogi, Yuki, Manami Hagizaki, Tatsuya Oyama, et al. "Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor." Electronics 14, no. 10 (2025): 1971. https://doi.org/10.3390/electronics14101971.

Full text
Abstract:
The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification for sensors with limited hardware resources. In this paper, the security risks associated with image sensor data are described. Adversarial examples (AEs) targeting the MIPI interface can induce misclassification, making image data integrity verification essential. A CMOS image sensor with a message authentication code (CIS-MAC) is then proposed a
APA, Harvard, Vancouver, ISO, and other styles
43

Pyi Phyo Aung, Nordinah Ismail, Chia Yee Ooi, Koichiro Mashiko, Hau Sim Choo, and Takanori Matsuzaki. "Data Remanence Based Approach towards Stable Key Generation from Physically Unclonable Function Response of Embedded SRAMs using Binary Search." Journal of Advanced Research in Applied Sciences and Engineering Technology 35, no. 2 (2023): 114–31. http://dx.doi.org/10.37934/araset.35.2.114131.

Full text
Abstract:
Today’s device authentications in IoT devices use public and private key cryptography. Nevertheless, they are still vulnerable to threats because keys or device IDs digitally stored in IoT devices can be stolen or cloned. In contrast, SRAM PUFs utilize physical variations in memory cells of embedded SRAM in microcontrollers or standalone SRAM chips. These inherent physical characteristics are unpredictable and practically impossible to duplicate. They are negligible to affect regular SRAM operation but large enough to be used for authentication purposes in SRAM PUFs operation. However, SRAM PU
APA, Harvard, Vancouver, ISO, and other styles
44

Kumar, Vikas, Rahul Kumar, Srinivas Jangirala, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing." Security and Communication Networks 2022 (July 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/8998339.

Full text
Abstract:
RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel between the tag and the reader are all possible security threats. Unverified tags or readers provide untrustworthy messages. IoT requires a safe and consistent RFID authentication system. PUFs are also physical one-way functions made up of the unique nano
APA, Harvard, Vancouver, ISO, and other styles
45

Mahalat, Mahabub Hasan, Suraj Mandal, Anindan Mondal, Bibhash Sen, and Rajat Subhra Chakraborty. "Implementation, Characterization and Application of Path Changing Switch based Arbiter PUF on FPGA as a lightweight Security Primitive for IoT." ACM Transactions on Design Automation of Electronic Systems 27, no. 3 (2022): 1–26. http://dx.doi.org/10.1145/3491212.

Full text
Abstract:
Secure authentication of any Internet-of-Things (IoT) device becomes the utmost necessity due to the lack of specifically designed IoT standards and intrinsic vulnerabilities with limited resources and heterogeneous technologies. Despite the suitability of arbiter physically unclonable function (APUF) among other PUF variants for the IoT applications, implementing it on field-programmable gate arrays (FPGAs) is challenging. This work presents the complete characterization of the path changing switch (PCS) 1 based APUF on two different families of FPGA, like Spartan-3E (90 nm CMOS) and Artix-7
APA, Harvard, Vancouver, ISO, and other styles
46

Hou, Jia, Zichu Liu, Zepeng Yang, and Chen Yang. "Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique." Micromachines 15, no. 1 (2024): 149. http://dx.doi.org/10.3390/mi15010149.

Full text
Abstract:
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely employed for AI systems. Given the ubiquitous deployment of these AI systems, there is a growing concern regarding the security of CNN accelerators and the potential attacks they may face, including hardware Trojans. This paper proposes a hardware Trojan designed to attack a crucial component of FPGA-based CNN accelerators: the reconfigurable inter
APA, Harvard, Vancouver, ISO, and other styles
47

Al-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane, and Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT." Sensors 20, no. 7 (2020): 1963. http://dx.doi.org/10.3390/s20071963.

Full text
Abstract:
The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a cen
APA, Harvard, Vancouver, ISO, and other styles
48

Bamashmos, Saeed, Naveen Chilamkurti, and Ahmad Salehi Shahraki. "Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in IoT Environment." Sensors 24, no. 11 (2024): 3575. http://dx.doi.org/10.3390/s24113575.

Full text
Abstract:
Abstract: Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for I
APA, Harvard, Vancouver, ISO, and other styles
49

Gao, Bin, Bohan Lin, Yachuan Pang, et al. "Concealable physically unclonable function chip with a memristor array." Science Advances 8, no. 24 (2022). http://dx.doi.org/10.1126/sciadv.abn7753.

Full text
Abstract:
A physically unclonable function (PUF) is a creditable and lightweight solution to the mistrust in billions of Internet of Things devices. Because of this remarkable importance, PUF need to be immune to multifarious attack means. Making the PUF concealable is considered an effective countermeasure but it is not feasible for existing PUF designs. The bottleneck is finding a reproducible randomness source that supports repeatable concealment and accurate recovery of the PUF data. In this work, we experimentally demonstrate a concealable PUF at the chip level with an integrated memristor array an
APA, Harvard, Vancouver, ISO, and other styles
50

Lee, Jeong Kyu, Ye Eun Kim, Min Hyeok Lee, and Young Keun Kim. "Physically Unclonable Function Utilizing Stochastic Indirect Exchange Interaction." Small Structures, March 8, 2025. https://doi.org/10.1002/sstr.202400527.

Full text
Abstract:
In hardware‐based security, physically unclonable function (PUF) has emerged as a promising solution for generating secret keys. While complementary metal–oxide–semiconductor‐based PUFs have been extensively studied, their reliability and scalability limitations have spurred the search for alternative approaches. This study introduces a spintronic PUF device that utilizes an indirect magnetic coupling, specifically the Ruderman–Kittel–Kasuya–Yosida (RKKY) interaction. This unique interaction enables either parallel or antiparallel coupling of ferromagnetic layers controlled by the thickness of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!