Physical unclonable functions in the internet of things: State of the art and open challenges

A Babaei, G Schiele - Sensors, 2019 - mdpi.com
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …

FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures

NN Anandakumar, MS Hashmi, M Tehranipoor - Integration, 2021 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …

A puf taxonomy

T McGrath, IE Bagci, ZM Wang, U Roedig… - Applied physics …, 2019 - pubs.aip.org
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …

A mutual security authentication method for RFID-PUF circuit based on deep learning

W Liang, S Xie, D Zhang, X Li, KC Li - ACM Transactions on Internet …, 2021 - dl.acm.org
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process
controls, thereby leveraging improvements in economic benefits, such as efficiency and …

Spectral sensitivity near exceptional points as a resource for hardware encryption

M Yang, L Zhu, Q Zhong, R El-Ganainy… - Nature …, 2023 - nature.com
The spectral sensitivity near exceptional points (EPs) has been recently explored as an
avenue for building sensors with enhanced sensitivity. However, to date, it is not clear …

PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs

M Khalafalla, C Gebotys - 2019 Design, automation & test in …, 2019 - ieeexplore.ieee.org
In the past decade and a half, physical unclonable functions (PUFs) have been introduced
as a promising cryptographic primitive for hardware security applications. Since then, the …

Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

Application of resistive random access memory in hardware security: A review

G Rajendran, W Banerjee… - Advanced Electronic …, 2021 - Wiley Online Library
Nowadays, advancements in the design of trusted system environments are relying on
security provided by hardware‐based primitives, while replacing resource‐hungry software …

A survey on silicon PUFs

F Zerrouki, S Ouchani, H Bouarfa - Journal of Systems Architecture, 2022 - Elsevier
Abstract Integrated Circuits (ICs) and electronic devices have become an integral part of
daily human life (mobile, home, car, etc.). However, specific security measures should be …

Implementation of efficient XOR arbiter PUF on FPGA with enhanced uniqueness and security

NN Anandakumar, MS Hashmi, MA Chaudhary - IEEE Access, 2022 - ieeexplore.ieee.org
Physically unclonable functions (PUFs) are recently utilized as a promising security solution
for authentication and identification of internet of things (IoT) devices. In this article, we …