Pour voir les autres types de publications sur ce sujet consultez le lien suivant : PUF Physically imcloneable function.

Articles de revues sur le sujet « PUF Physically imcloneable function »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « PUF Physically imcloneable function ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Chattopadhyay, Saranyu, Pranesh Santikellur, Rajat Subhra Chakraborty, Jimson Mathew, and Marco Ottavi. "A Conditionally Chaotic Physically Unclonable Function Design Framework with High Reliability." ACM Transactions on Design Automation of Electronic Systems 26, no. 6 (2021): 1–24. http://dx.doi.org/10.1145/3460004.

Texte intégral
Résumé :
Physically Unclonable Function (PUF) circuits are promising low-overhead hardware security primitives, but are often gravely susceptible to machine learning–based modeling attacks. Recently, chaotic PUF circuits have been proposed that show greater robustness to modeling attacks. However, they often suffer from unacceptable overhead, and their analog components are susceptible to low reliability. In this article, we propose the concept of a conditionally chaotic PUF that enhances the reliability of the analog components of a chaotic PUF circuit to a level at par with their digital counterparts
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zheng, Yujin, Alex Yakovlev, and Alex Bystrov. "A Power-Gated 8-Transistor Physically Unclonable Function Accelerates Evaluation Speeds." Journal of Low Power Electronics and Applications 13, no. 4 (2023): 53. http://dx.doi.org/10.3390/jlpea13040053.

Texte intégral
Résumé :
The proposed 8-Transistor (8T) Physically Unclonable Function (PUF), in conjunction with the power gating technique, can significantly accelerate a single evaluation cycle more than 100,000 times faster than a 6-Transistor (6T) Static Random-Access Memory (SRAM) PUF. The 8T PUF is built to swiftly eliminate data remanence and maximise physical mismatch. Moreover, a two-phase power gating module is devised to provide controllable power on/off cycles for the chosen PUF clusters in order to facilitate fast statistical measurements and curb the in-rush current. The architecture andhardware impleme
Styles APA, Harvard, Vancouver, ISO, etc.
3

Komano, Yuichi, Kazuo Ohta, Kazuo Sakiyama, Mitsugu Iwamoto, and Ingrid Verbauwhede. "Single-Round Pattern Matching Key Generation Using Physically Unclonable Function." Security and Communication Networks 2019 (January 1, 2019): 1–13. http://dx.doi.org/10.1155/2019/1719585.

Texte intégral
Résumé :
Paral and Devadas introduced a simple key generation scheme with a physically unclonable function (PUF) that requires no error correction, e.g., by using a fuzzy extractor. Their scheme, called a pattern matching key generation (PMKG) scheme, is based on pattern matching between auxiliary data, assigned at the enrollment in advance, and a substring of PUF output, to reconstruct a key. The PMKG scheme repeats a round operation, including the pattern matching, to derive a key with high entropy. Later, to enhance the efficiency and security, a circular PMKG (C-PMKG) scheme was proposed. However,
Styles APA, Harvard, Vancouver, ISO, etc.
4

Lee, Sangjae, Mi-Kyung Oh, Yousung Kang, and Dooho Choi. "Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices." Sensors 20, no. 2 (2020): 404. http://dx.doi.org/10.3390/s20020404.

Texte intégral
Résumé :
Keeping IoT devices secure has been a major challenge recently. One of the possible solutions to secure IoT devices is to use a physically unclonable function (PUF). A PUF is a security primitive that can generate device-specific cryptographic information by extracting the features of hardware uncertainty. Because PUF instances are very difficult to replicate even by the manufacturer, the generated bit sequence can be used as cryptographic keys or as a unique identifier for the device. Regarding the implementation of PUF, the majority of PUFs introduced over the past decade are in the form of
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ivaniuk, A. A. "Investigation of the physically unclonable function of a configurable ring oscillator." Informatics 22, no. 1 (2025): 73–89. https://doi.org/10.37661/1816-0301-2025-22-1-73-89.

Texte intégral
Résumé :
Objectives. Design and implementation features of a Physically Unclonable Function (PUF) based on a Configurable Ring Oscillator (CRO) on FPGA platforms are examined. The study aims to evaluate the key parameters of CRO circuits and the characteristics of CRO-based PUFs under various simulation scenarios and placement configurations on FPGA dies.Methods. Methods of synthesis and analysis of digital devices are employed, including those based on programmable logic integrated circuits, as well as the fundamentals of digital circuit design.Results. A generalized model of a PUF based on the compar
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lapidas, V., A. Zhizhchenko, E. Pustovalov, D. Storozhenko, and A. Kuchmizhak. "Direct laser printing of high-resolution physically unclonable function anti-counterfeit labels." Applied Physics Letters 120, no. 26 (2022): 261104. http://dx.doi.org/10.1063/5.0091213.

Texte intégral
Résumé :
Security labels combining facile structural color readout and physically unclonable one-way function (PUF) approach provide promising strategy for fighting against forgery of marketable products. Here, we justify direct femtosecond-laser printing, a simple and scalable technology, for fabrication of high-resolution (12 500 dots per inch) and durable PUF labels with a substantially large encoding capacity of 10895 and a simple spectroscopy-free optical signal readout. The proposed tags are comprised of laser-printed plasmonic nanostructures exhibiting unique light scattering behavior and unclon
Styles APA, Harvard, Vancouver, ISO, etc.
7

Ivaniuk, A. A., and A. Y. Shamyna. "Physically non-cloneable arbiter -type function with non-linear path pairs." «System analysis and applied information science», no. 1 (August 2, 2023): 54–62. http://dx.doi.org/10.21122/2309-4923-2023-1-54-62.

Texte intégral
Résumé :
Physically unclonable functions (PUFs) are basic physical cryptographical primitives, providing to solve tasks such as unclonable identification, digital device authentication and copyright authentication, true random sequence generation, etc. The major features of PUFs are stability, unpredictability and irreproducibility, due to uncontrollable random variations of distinctive features of the raw materials and technological processes used during their manufacturing. Generally, PUF are digital circuits that extract such variations and convert them into a binary format, which applied for furthe
Styles APA, Harvard, Vancouver, ISO, etc.
8

Watanabe, Yuichi, Kouji Suemori, Kazunori Kuribara, Nobuko Fukuda, Ken-ichi Nomura, and Sei Uemura. "Development of a simple contact-type printable physically unclonable function device using percolation conduction of rod-like conductive fillers." Japanese Journal of Applied Physics 61, SE (2022): SE1005. http://dx.doi.org/10.35848/1347-4065/ac506b.

Texte intégral
Résumé :
Abstract We suggested a printable physically unclonable function (PUF) with a simple circuit structure, to provide a low-cost PUF for improvement in the security level of electronic devices. An element of our contact-type printable PUF was constructed of a conductive filler layer and a pair of electrodes formed by printing. The contact-type printable PUF was based on an open- or short-circuit information of elements induced by a percolation conduction phenomenon of the conductive filler layer. An average conduction probability of the elements could be controlled by adjusting the manufacturing
Styles APA, Harvard, Vancouver, ISO, etc.
9

Okura, Shunsuke, Masanori Aoki, Tatsuya Oyama, et al. "Area-Efficient Post-Processing Circuits for Physically Unclonable Function with 2-Mpixel CMOS Image Sensor." Sensors 21, no. 18 (2021): 6079. http://dx.doi.org/10.3390/s21186079.

Texte intégral
Résumé :
In order to realize image information security starting from the data source, challenge–response (CR) device authentication, based on a Physically Unclonable Function (PUF) with a 2 Mpixel CMOS image sensor (CIS), is studied, in which variation of the transistor in the pixel array is utilized. As each CR pair can be used only once to make the CIS PUF resistant to the modeling attack, CR authentication with CIS can be carried out 4050 times, with basic post-processing to generate the PUF ID. If a larger number of authentications is required, advanced post-processing using Lehmer encoding can be
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kuribara, Kazunori, Yuichi Watanabe, Atsushi Takei, Sei Uemura, and Manabu Yoshida. "Robustness of organic physically unclonable function with buskeeper circuit for flexible security devices." Japanese Journal of Applied Physics 61, SE (2022): SE1016. http://dx.doi.org/10.35848/1347-4065/ac4c6a.

Texte intégral
Résumé :
Abstract Flexible devices have been studied to realize IoT or novel wearable devices. The data that flexible devices deal with can include personal information when application areas further expand. A security system for flexible devices becomes more important in this case. In this study, we investigate the thermal stability of an organic flexible security system. The security system utilizes fabrication variation of a chip, and it is called a physically unclonable function (PUF). As a result, the bit error rate of the organic PUF is 1.8% and the index of ID uniqueness (i.e., randomness) has a
Styles APA, Harvard, Vancouver, ISO, etc.
11

Abdolinezhad, Saeed, Lukas Zimmermann, and Axel Sikora. "A Novel Key Generation Method for Group-Based Physically Unclonable Function Designs." Electronics 10, no. 21 (2021): 2597. http://dx.doi.org/10.3390/electronics10212597.

Texte intégral
Résumé :
In recent years, physically unclonable functions (PUFs) have gained significant attraction in IoT security applications, such as cryptographic key generation and entity authentication. PUFs extract the uncontrollable production characteristics of different devices to generate unique fingerprints for security applications. When generating PUF-based secret keys, the reliability and entropy of the keys are vital factors. This study proposes a novel method for generating PUF-based keys from a set of measurements. Firstly, it formulates the group-based key generation problem as an optimization prob
Styles APA, Harvard, Vancouver, ISO, etc.
12

Huang, Zhao, Liang Li, Yin Chen, Zeyu Li, Quan Wang, and Xiaohong Jiang. "RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices." Electronics 10, no. 23 (2021): 3039. http://dx.doi.org/10.3390/electronics10233039.

Texte intégral
Résumé :
With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. It utilizes the inherent nature of hardware to generate a random and unpredictable fingerprint to uniquely identify an IoT device. However, despite existing PUFs having exhibited a good performance, th
Styles APA, Harvard, Vancouver, ISO, etc.
13

Khan, Mohammad Nasim Imtiaz, Chak Yuen Cheng, Sung Hao Lin, Abdullah Ash-Saki, and Swaroop Ghosh. "A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory." Journal of Low Power Electronics and Applications 11, no. 1 (2021): 5. http://dx.doi.org/10.3390/jlpea11010005.

Texte intégral
Résumé :
We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG). The PUF realized by manipulating the write time and the TRNG is realized by tweaking the number of write pulses. Our analysis indicates that more than 75% bits in the PUF are unusable without any correction due to their inability to exhibit any randomness. We exploit temporal randomness of working columns to fix the unusable columns and write latency to fix the unusable rows during the enrollment. The intra-HD, inter-HD, energy, bandwidth
Styles APA, Harvard, Vancouver, ISO, etc.
14

Della Sala, Riccardo, Davide Bellizia, Francesco Centurelli, and Giuseppe Scotti. "A Monostable Physically Unclonable Function Based on Improved RCCMs with 0–1.56% Native Bit Instability at 0.6–1.2 V and 0–75 °C." Electronics 12, no. 3 (2023): 755. http://dx.doi.org/10.3390/electronics12030755.

Texte intégral
Résumé :
In this work, a Physically Unclonable Function (PUF) based on an improved regulated cascode current mirror (IRCCM) is presented. The proposed IRCCM improves the loop-gain of the gain-boosting branch over the conventional RCCM PUF, thereby increasing the output resistance and amplifying the mismatches due to random variations. The introduction of an explicit reference current in the biasing branch of the IRCCM results in lower native unstable bits, good robustness against environmental variations and very stable power consumption. The proposed PUF has been validated through measurement results
Styles APA, Harvard, Vancouver, ISO, etc.
15

Hu, Shuang, Pengjun Wang, Haonan He, Yuejun Zhang, and Xiangyu Li. "Gas Sensor Physically Unclonable Function-Based Lightweight Bidirectional Authentication Protocol for Gas Sensor Networks." Electronics 13, no. 17 (2024): 3385. http://dx.doi.org/10.3390/electronics13173385.

Texte intégral
Résumé :
In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonable functions (GS-PUFs) with authentication technology to guarantee the reliability of data from sensor nodes. A sensor PUF array is constructed by preparing gas sensors to enhance the data security of the physical layer and reduce hardware resource consumption. The authentication part of the protocol mainly uses lightweight encryption methods, consi
Styles APA, Harvard, Vancouver, ISO, etc.
16

Julius, Han Loong Teo, Alia Noor Hashim Noor, Ghazali Azrul, and Azlee Hamid Fazrena. "Configurations of memristor-based APUF for improved performance." Bulletin of Electrical Engineering and Informatics 8, no. 1 (2019): 74–82. https://doi.org/10.11591/eei.v8i1.1401.

Texte intégral
Résumé :
The memristor-based arbiter PUF (APUF) has great potential to be used for hardware security purposes. Its advantage is in its challenge-dependent delays, which cannot be modeled by machine learning algorithms. In this paper, further improvement is proposed, which are circuit configurations to the memristor-based APUF. Two configuration aspects were introduced namely varying the number of memristor per transistor, and the number of challenge and response bits. The purpose of the configurations is to introduce additional variation to the PUF, thereby improve PUF performance in terms of uniquenes
Styles APA, Harvard, Vancouver, ISO, etc.
17

Al-Ani, Hussien, and Israa Al-Mashhadani. "Memristive-Based Physical Unclonable Function Design of Authentication Architectures: A Systematic Review." Mesopotamian Journal of CyberSecurity 4, no. 2 (2024): 88–105. http://dx.doi.org/10.58496/mjcs/2024/009.

Texte intégral
Résumé :
Physically unclonable functions (PUFs) are advanced physical security measures that offer fundamental, unclonable appraisals of physical objects, providing an effective defense against hardware vulnerability breaches. They function as unique digital hardware fingerprints. This study discusses previous methods adopted for improving hardware security via PUF technology, with a specific focus on PUF circuits implemented on FPGA boards. Hardware security is assumed to be enhanced by adding a memristor to the ring oscillator PUF circuit and implementing these authentication architectures on FPGA bo
Styles APA, Harvard, Vancouver, ISO, etc.
18

Asghari, Meysam, Marino Guzman, and Nima Maghari. "Cross-Coupled Impedance-Based Physically Unclonable Function (PUF) With 1.06% Native Instability." IEEE Solid-State Circuits Letters 3 (2020): 282–85. http://dx.doi.org/10.1109/lssc.2020.3012546.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Sun, Da-Zhi, Yi-Na Gao, and Yangguang Tian. "On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices." Sensors 23, no. 14 (2023): 6559. http://dx.doi.org/10.3390/s23146559.

Texte intégral
Résumé :
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication and the Node-to-Server (N2S) authentication into a standalone protocol. In this paper, we therefore examine the security of the PUF protocol under the assumption of an insider attack. Our cryptanalysis findings are the following. (1) A legitimate but malicious IoT node can monitor the secure communication among the server and any other IoT nodes in
Styles APA, Harvard, Vancouver, ISO, etc.
20

Bin Tarik, Farhan, Azadeh Famili, Yingjie Lao, and Judson D. Ryckman. "Robust optical physical unclonable function using disordered photonic integrated circuits." Nanophotonics 9, no. 9 (2020): 2817–28. http://dx.doi.org/10.1515/nanoph-2020-0049.

Texte intégral
Résumé :
AbstractPhysical unclonable function (PUF) has emerged as a promising and important security primitive for use in modern systems and devices, due to their increasingly embedded, distributed, unsupervised, and physically exposed nature. However, optical PUFs based on speckle patterns, chaos, or ‘strong’ disorder are so far notoriously sensitive to probing and/or environmental variations. Here we report an optical PUF designed for robustness against fluctuations in optical angular/spatial alignment, polarization, and temperature. This is achieved using an integrated quasicrystal interferometer (
Styles APA, Harvard, Vancouver, ISO, etc.
21

Kurtoglu, Abdullah, Amir H. M. Shirazi, Shahriar Mirabbasi, and Hossein Miri Lavasani. "A Low-Power, 65 nm 24.6-to-30.1 GHz Trusted LC Voltage-Controlled Oscillator Achieving 191.7 dBc/Hz FoM at 1 MHz." Journal of Low Power Electronics and Applications 14, no. 1 (2024): 10. http://dx.doi.org/10.3390/jlpea14010010.

Texte intégral
Résumé :
This work presents a novel trusted LC voltage-controlled oscillator (VCO) with an embedded compact analog Physically Unclonable Function (PUF) used for authentication. The trusted VCO is implemented in a 1P9M 65 nm standard CMOS process and consumes 1.75 mW. It exhibits a measured phase noise (PN) of −104.8 dBc/Hz @ 1 MHz and −132.2 dBc/Hz @ 10 MHz offset, resulting in Figures of Merit (FoMs) of 191.7 dBc/Hz and 199.1 dBc/Hz, respectively. With the measured frequency tuning range (TR) of ~5.5 GHz, the FoM with tuning (FoMT) reaches 197.6 dBc/Hz and 205.0 dBc/Hz at 1 MHz and 10 MHz offset, resp
Styles APA, Harvard, Vancouver, ISO, etc.
22

Perumalla, Anvesh, and John M. Emmert. "Memometer: Memory PUF-based Hardware Metering Methodology for FPGAs." EDFA Technical Articles 24, no. 4 (2022): 12–21. http://dx.doi.org/10.31399/asm.edfa.2022-4.p012.

Texte intégral
Résumé :
Abstract This article describes a hardware metering fingerprint technique, called the memometer, that addresses supply chain integrity issues with field-programmable gate arrays (FPGAs). The memometer is a physically unclonable function (PUF) based on cross-coupled lookup tables that overcomes manufacturing memory power-on preset. The fingerprints are not only unique, but also reliable with average hamming distances close to the ideal values of 50% (interchip) and 0% (intrachip). Instead of having one fingerprint per device, the memometer makes provision for hundreds with the potential for mor
Styles APA, Harvard, Vancouver, ISO, etc.
23

Lin, Yu-Hsuan, Dai-Ying Lee, Ming-Hsiu Lee, et al. "A novel 1T2R self-reference physically unclonable function suitable for advanced logic nodes for high security level applications." Japanese Journal of Applied Physics 61, SC (2022): SC1003. http://dx.doi.org/10.35848/1347-4065/ac3a8d.

Texte intégral
Résumé :
Abstract A self-reference resistive random-access memory (ReRAM)-based one-transistor, two-ReRAM (1T2R) physically unclonable function (PUF) is proposed to provide a hardware security feature for electrical products in the IoT/5G era. There are four advantages from the proposed structure: (1) a small cell size; (2) intrinsic randomness; (3) no programming circuit; and (4) no data retention concerns. The conduction mechanism, temperature dependency, and read fluctuation of the pristine ReRAM device are studied. An information–address separation scheme is proposed which not only reduces the impa
Styles APA, Harvard, Vancouver, ISO, etc.
24

Sun, Da-Zhi, and Yangguang Tian. "Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices." Mathematics 10, no. 22 (2022): 4310. http://dx.doi.org/10.3390/math10224310.

Texte intégral
Résumé :
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require the storage of any sensitive information on the local memory of the IoT device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate the security of Zerrouki et al.’s PUF protocol under the leakage assumption of the session key. Our findings are in the following. First, Zerrouki et al.’s PUF protoco
Styles APA, Harvard, Vancouver, ISO, etc.
25

Boikov, Konstantin A. "Radiosensor identification and authentication of radio-electronic devices." T-Comm 16, no. 5 (2022): 15–20. http://dx.doi.org/10.36724/2072-8735-2022-16-5-15-20.

Texte intégral
Résumé :
The presented work is devoted to the study of a new physically unclonable function (PUF) associated with the intrinsic electromagnetic radiation of a radio electronic device. This PUF arises as a result of the technological spread of the parameters of electronic components. The relevance of this study is explained by the fact that modern methods of protecting radio-electronic products from illegal cloning have a number of serious drawbacks associated with increased power consumption, the use of processor time, and the need for galvanic access to the object of study. Partially, these problems a
Styles APA, Harvard, Vancouver, ISO, etc.
26

Kim, Bruce, and Sang-Bock Cho. "A Secure Tunable LNA Design for Internet of Things." International Symposium on Microelectronics 2017, no. 1 (2017): 000705–8. http://dx.doi.org/10.4071/isom-2017-thp22_138.

Texte intégral
Résumé :
Abstract This paper describes the design of through-silicon via (TSV)-based inductors for a secure tunable low-noise amplifier (LNA) in Internet of Things (IoT) devices. To improve cybersecurity infrastructure, we designed a tunable LNA with hardware security. Our secure design for tunable LNA uses a ring oscillator-based physically unclonable function (PUF) circuit. For the 3D inductors, we use ferromagnetic materials to achieve high inductance with a good quality factor.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Lalouani, Wassila, Mohamed Younis, Mohammad Ebrahimabadi, and Naghmeh Karimi. "Countering Modeling Attacks in PUF-based IoT Security Solutions." ACM Journal on Emerging Technologies in Computing Systems 18, no. 3 (2022): 1–28. http://dx.doi.org/10.1145/3491221.

Texte intégral
Résumé :
Hardware fingerprinting has emerged as a viable option for safeguarding IoT devices from cyberattacks. Such a fingerprint is used to not only authenticate the interconnected devices but also to derive cryptographic keys for ensuring data integrity and confidentiality. A Physically Unclonable Function (PUF) is deemed as an effective fingerprinting mechanism for resource-constrained IoT devices since it is simple to implement and imposes little overhead. A PUF design is realized based on the unintentional variations of microelectronics manufacturing processes. When queried with input bits (chall
Styles APA, Harvard, Vancouver, ISO, etc.
28

Kumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.

Texte intégral
Résumé :
A very important part of any software or hardware associated with the Internet of Things (IoT) is the User Access Control. User Access Control deals with the important security features like authenticating a legitimate user, authorizing a user, etc. A very effective and secure way to ensure the user access control is: three factor user access control. Some three factor user authentication schemes have been developed in the past, brief details regarding them can be found in further sections of the paper. In this paper, we propose a new three factor user access control scheme. Our proposed schem
Styles APA, Harvard, Vancouver, ISO, etc.
29

Tkach, A., M. Rider, I. Kaliya, K. Strelkova, and K. Bogdanov. "Developing Multi-Modal Anti-Counterfeiting Systems with Randomized Whispering Gallery Mode Active Microresonators." Journal of Physics: Conference Series 2978, no. 1 (2025): 012005. https://doi.org/10.1088/1742-6596/2978/1/012005.

Texte intégral
Résumé :
Abstract Counterfeiting presents critical global challenges, demanding advanced anti-counterfeiting technologies. This study introduces a scalable optical physically unclonable function (PUF) system based on whispering-gallery mode (WGM) resonators formed by polystyrene microspheres coated with AgInS2/ZnS quantum dots (QDs). The system leverages geometric variations in microspheres’ features to generate unique spectral signatures for secure optical identifiers. While the fabrication process allows control over the average size of the microspheres and the emission band of the QDs, the precise p
Styles APA, Harvard, Vancouver, ISO, etc.
30

Aarella, Seema G., Venkata P. Yanambaka, Saraju P. Mohanty, and Elias Kougianos. "Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing." Future Internet 17, no. 7 (2025): 272. https://doi.org/10.3390/fi17070272.

Texte intégral
Résumé :
This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional methods that transmit full binary Challenge–Response Pairs (CRPs) and risk exposing sensitive data, Fortified-Edge 2.0 employs a machine-learning-driven feature-abstraction technique to extract and utilize only essential characteristics of CRPs, obfuscating the raw binary sequences. These feature vectors are then processed using lightweight cryptogra
Styles APA, Harvard, Vancouver, ISO, etc.
31

Mahalat, Mahabub Hasan, Dipankar Karmakar, Anindan Mondal, and Bibhash Sen. "PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (2022): 1–23. http://dx.doi.org/10.1145/3466682.

Texte intégral
Résumé :
The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploiting the unique inherent randomness of a device. In this article, we have proposed an
Styles APA, Harvard, Vancouver, ISO, etc.
32

Mondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally, and Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol." ACM Transactions on Embedded Computing Systems 22, no. 5s (2023): 1–23. http://dx.doi.org/10.1145/3609104.

Texte intégral
Résumé :
Remote attestation is a request-response based security service that permits a trusted entity (verifier) to check the current state of an untrusted remote device (prover). The verifier initiates the attestation process by sending an attestation challenge to the prover; the prover responds with its current state, which establishes its trustworthiness. Physically Unclonable Function (PUF) offers an attractive choice for hybrid attestation schemes owing to its low overhead security guarantees. However, this comes with the limitation of secure storage of the PUF model or large challenge-response d
Styles APA, Harvard, Vancouver, ISO, etc.
33

Arcenegui, Javier, Rosario Arjona, Roberto Román, and Iluminada Baturone. "Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs." Sensors 21, no. 9 (2021): 3119. http://dx.doi.org/10.3390/s21093119.

Texte intégral
Résumé :
Non-fungible tokens (NFTs) are widely used in blockchain to represent unique and non-interchangeable assets. Current NFTs allow representing assets by a unique identifier, as a possession of an owner. The novelty introduced in this paper is the proposal of smart NFTs to represent IoT devices, which are physical smart assets. Hence, they are also identified as the utility of a user, they have a blockchain account (BCA) address to participate actively in the blockchain transactions, they can establish secure communication channels with owners and users, and they operate dynamically with several
Styles APA, Harvard, Vancouver, ISO, etc.
34

Julius, Han Loong Teo, Alia Nor Hashim Noor, Ghazali Azrul, and Azlee Hamid Fazrena. "Ring oscillator physically unclonable function using sequential ring oscillator pairs for more challenge-response-pairs." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 892–901. https://doi.org/10.11591/ijeecs.v13.i3.pp892-901.

Texte intégral
Résumé :
The ring oscillator physically unclonable function (ROPUF) is one of the several types of PUF that has great potential to be used for security purposes. An alternative ROPUF design is proposed with two major differences. Firstly, the memristor is included in the ring oscillators as it is claimed to produce a more random oscillation frequency. Other reasons are its memorylike properties and variable memristance, relative compatibility with CMOS, and small size. Secondly, a different method of generating the response is implemented whereby a sequence of selection of ring oscillator pairs are use
Styles APA, Harvard, Vancouver, ISO, etc.
35

Loong Teo, Julius Han, Noor Alia Nor Hashim, Azrul Ghazali, and Fazrena Azlee Hamid. "Ring oscillator physically unclonable function using sequential ring oscillator pairs for more challenge-response-pairs." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (2019): 892. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp892-901.

Texte intégral
Résumé :
<span>The ring oscillator physically unclonable function (ROPUF) is one of the several types of PUF that has great potential to be used for security purposes. An alternative ROPUF design is proposed with two major differences. Firstly, the memristor is included in the ring oscillators as it is claimed to produce a more random oscillation frequency. Other reasons are its memory-like properties and variable memristance, relative compatibility with CMOS, and small size. Secondly, a different method of generating the response is implemented whereby a sequence of selection of ring oscillator
Styles APA, Harvard, Vancouver, ISO, etc.
36

Smirnov, Alexander, Mikhail Yarovikov, Ekaterina Zhdanova, Alexander Gutor, and Mikhail Vyatkin. "An Optical-Fiber-Based Key for Remote Authentication of Users and Optical Fiber Lines." Sensors 23, no. 14 (2023): 6390. http://dx.doi.org/10.3390/s23146390.

Texte intégral
Résumé :
We have shown the opportunity to use the unique inhomogeneities of the internal structure of an optical fiber waveguide for remote authentication of users or an optic fiber line. Optical time domain reflectometry (OTDR) is demonstrated to be applicable to observing unclonable backscattered signal patterns at distances of tens of kilometers. The physical nature of the detected patterns was explained, and their characteristic spatial periods were investigated. The patterns are due to the refractive index fluctuations of a standard telecommunication fiber. We have experimentally verified that the
Styles APA, Harvard, Vancouver, ISO, etc.
37

HIROMOTO, Masayuki, Motoki YOSHINAGA, and Takashi SATO. "MRO-PUF: Physically Unclonable Function with Enhanced Resistance against Machine Learning Attacks Utilizing Instantaneous Output of Ring Oscillator." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 7 (2018): 1035–44. http://dx.doi.org/10.1587/transfun.e101.a.1035.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Afghah, Fatemeh, Bertrand Cambou, Masih Abedini, and Sherali Zeadally. "A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks." International Journal of Wireless Information Networks 25, no. 2 (2018): 117–29. http://dx.doi.org/10.1007/s10776-018-0391-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Mo, Jiaqing, Zhihua Zhang, and Yuhua Lin. "A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF." Electronics 14, no. 1 (2024): 10. https://doi.org/10.3390/electronics14010010.

Texte intégral
Résumé :
In a distributed wireless sensor network (DWSN), sensors continuously perceive the environment, collect data, and transmit it to remote users through the network so as to realize real-time monitoring of the environment or specific targets. However, given the openness of wireless channels and the sensitivity of collecting data, designing a robust user authentication protocol to ensure the legitimacy of user and sensors in such DWSN environments faces serious challenges. Most of the current authentication schemes fail to meet some important and often overlooked security features, such as resisti
Styles APA, Harvard, Vancouver, ISO, etc.
40

Lee, Hyang Jin, Sangjin Kook, Keunok Kim, et al. "Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine." Sensors 25, no. 9 (2025): 2894. https://doi.org/10.3390/s25092894.

Texte intégral
Résumé :
Medical Internet of Things (IoT) systems are crucial in monitoring the health status of patients. Recently, telemedicine services that manage patients remotely by receiving real-time health information from IoT devices attached to or carried by them have experienced significant growth. A primary concern in medical IoT services is ensuring the security of transmitted information and protecting patient privacy. To address these challenges, various authentication schemes have been proposed. We analyze the authentication scheme by Wang et al. and identified several limitations. Specifically, an at
Styles APA, Harvard, Vancouver, ISO, etc.
41

Yiming Chen, Yiming Chen, Hongjun Duan Yiming Chen, Dong Wang Hongjun Duan, Yining Liu Dong Wang, and Chin-Chen Chang Yining Liu. "SERDA: Secure Enhanced and Robust Data Aggregation Scheme for Smart Grid." 電腦學刊 35, no. 5 (2024): 073–90. http://dx.doi.org/10.53106/199115992024103505006.

Texte intégral
Résumé :
<p>Data aggregation is considered a viable security and privacy solution for smart grid as it allows to obtain the total electricity consumption within a region without disclosing individual data. However, existing data aggregation schemes give little consideration in their threat models to use cases where devices operate in untrustworthy environments and adversaries have physical system access, which is common in the smart grid. They cannot support authentication and resist physical attacks while maintaining data privacy and supporting fault tolerance for smart meter (SM) failures. Moti
Styles APA, Harvard, Vancouver, ISO, etc.
42

Rogi, Yuki, Manami Hagizaki, Tatsuya Oyama, et al. "Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor." Electronics 14, no. 10 (2025): 1971. https://doi.org/10.3390/electronics14101971.

Texte intégral
Résumé :
The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification for sensors with limited hardware resources. In this paper, the security risks associated with image sensor data are described. Adversarial examples (AEs) targeting the MIPI interface can induce misclassification, making image data integrity verification essential. A CMOS image sensor with a message authentication code (CIS-MAC) is then proposed a
Styles APA, Harvard, Vancouver, ISO, etc.
43

Pyi Phyo Aung, Nordinah Ismail, Chia Yee Ooi, Koichiro Mashiko, Hau Sim Choo, and Takanori Matsuzaki. "Data Remanence Based Approach towards Stable Key Generation from Physically Unclonable Function Response of Embedded SRAMs using Binary Search." Journal of Advanced Research in Applied Sciences and Engineering Technology 35, no. 2 (2023): 114–31. http://dx.doi.org/10.37934/araset.35.2.114131.

Texte intégral
Résumé :
Today’s device authentications in IoT devices use public and private key cryptography. Nevertheless, they are still vulnerable to threats because keys or device IDs digitally stored in IoT devices can be stolen or cloned. In contrast, SRAM PUFs utilize physical variations in memory cells of embedded SRAM in microcontrollers or standalone SRAM chips. These inherent physical characteristics are unpredictable and practically impossible to duplicate. They are negligible to affect regular SRAM operation but large enough to be used for authentication purposes in SRAM PUFs operation. However, SRAM PU
Styles APA, Harvard, Vancouver, ISO, etc.
44

Kumar, Vikas, Rahul Kumar, Srinivas Jangirala, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. "An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing." Security and Communication Networks 2022 (July 30, 2022): 1–18. http://dx.doi.org/10.1155/2022/8998339.

Texte intégral
Résumé :
RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel between the tag and the reader are all possible security threats. Unverified tags or readers provide untrustworthy messages. IoT requires a safe and consistent RFID authentication system. PUFs are also physical one-way functions made up of the unique nano
Styles APA, Harvard, Vancouver, ISO, etc.
45

Mahalat, Mahabub Hasan, Suraj Mandal, Anindan Mondal, Bibhash Sen, and Rajat Subhra Chakraborty. "Implementation, Characterization and Application of Path Changing Switch based Arbiter PUF on FPGA as a lightweight Security Primitive for IoT." ACM Transactions on Design Automation of Electronic Systems 27, no. 3 (2022): 1–26. http://dx.doi.org/10.1145/3491212.

Texte intégral
Résumé :
Secure authentication of any Internet-of-Things (IoT) device becomes the utmost necessity due to the lack of specifically designed IoT standards and intrinsic vulnerabilities with limited resources and heterogeneous technologies. Despite the suitability of arbiter physically unclonable function (APUF) among other PUF variants for the IoT applications, implementing it on field-programmable gate arrays (FPGAs) is challenging. This work presents the complete characterization of the path changing switch (PCS) 1 based APUF on two different families of FPGA, like Spartan-3E (90 nm CMOS) and Artix-7
Styles APA, Harvard, Vancouver, ISO, etc.
46

Hou, Jia, Zichu Liu, Zepeng Yang, and Chen Yang. "Hardware Trojan Attacks on the Reconfigurable Interconnections of Field-Programmable Gate Array-Based Convolutional Neural Network Accelerators and a Physically Unclonable Function-Based Countermeasure Detection Technique." Micromachines 15, no. 1 (2024): 149. http://dx.doi.org/10.3390/mi15010149.

Texte intégral
Résumé :
Convolutional neural networks (CNNs) have demonstrated significant superiority in modern artificial intelligence (AI) applications. To accelerate the inference process of CNNs, reconfigurable CNN accelerators that support diverse networks are widely employed for AI systems. Given the ubiquitous deployment of these AI systems, there is a growing concern regarding the security of CNN accelerators and the potential attacks they may face, including hardware Trojans. This paper proposes a hardware Trojan designed to attack a crucial component of FPGA-based CNN accelerators: the reconfigurable inter
Styles APA, Harvard, Vancouver, ISO, etc.
47

Al-Aqrabi, Hussain, Anju P. Johnson, Richard Hill, Phil Lane, and Tariq Alsboui. "Hardware-Intrinsic Multi-Layer Security: A New Frontier for 5G Enabled IIoT." Sensors 20, no. 7 (2020): 1963. http://dx.doi.org/10.3390/s20071963.

Texte intégral
Résumé :
The introduction of 5G communication capabilities presents additional challenges for the development of products and services that can fully exploit the opportunities offered by high bandwidth, low latency networking. This is particularly relevant to an emerging interest in the Industrial Internet of Things (IIoT), which is a foundation stone of recent technological revolutions such as Digital Manufacturing. A crucial aspect of this is to securely authenticate complex transactions between IIoT devices, whilst marshalling adversarial requests for system authorisation, without the need for a cen
Styles APA, Harvard, Vancouver, ISO, etc.
48

Bamashmos, Saeed, Naveen Chilamkurti, and Ahmad Salehi Shahraki. "Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in IoT Environment." Sensors 24, no. 11 (2024): 3575. http://dx.doi.org/10.3390/s24113575.

Texte intégral
Résumé :
Abstract: Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for I
Styles APA, Harvard, Vancouver, ISO, etc.
49

Gao, Bin, Bohan Lin, Yachuan Pang, et al. "Concealable physically unclonable function chip with a memristor array." Science Advances 8, no. 24 (2022). http://dx.doi.org/10.1126/sciadv.abn7753.

Texte intégral
Résumé :
A physically unclonable function (PUF) is a creditable and lightweight solution to the mistrust in billions of Internet of Things devices. Because of this remarkable importance, PUF need to be immune to multifarious attack means. Making the PUF concealable is considered an effective countermeasure but it is not feasible for existing PUF designs. The bottleneck is finding a reproducible randomness source that supports repeatable concealment and accurate recovery of the PUF data. In this work, we experimentally demonstrate a concealable PUF at the chip level with an integrated memristor array an
Styles APA, Harvard, Vancouver, ISO, etc.
50

Lee, Jeong Kyu, Ye Eun Kim, Min Hyeok Lee, and Young Keun Kim. "Physically Unclonable Function Utilizing Stochastic Indirect Exchange Interaction." Small Structures, March 8, 2025. https://doi.org/10.1002/sstr.202400527.

Texte intégral
Résumé :
In hardware‐based security, physically unclonable function (PUF) has emerged as a promising solution for generating secret keys. While complementary metal–oxide–semiconductor‐based PUFs have been extensively studied, their reliability and scalability limitations have spurred the search for alternative approaches. This study introduces a spintronic PUF device that utilizes an indirect magnetic coupling, specifically the Ruderman–Kittel–Kasuya–Yosida (RKKY) interaction. This unique interaction enables either parallel or antiparallel coupling of ferromagnetic layers controlled by the thickness of
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!