DC-PUF: machine learning-resistant PUF-based authentication protocol using dependency chain for resource-constraint IoT devices

A Sajadi, A Shabani, B Alizadeh - Journal of Network and Computer …, 2023 - Elsevier
Abstract The Physical Unclonable Function (PUF) is a hardware block which exploits the
inherent process variations introduced during manufacturing to assign a unique fingerprint …

A comparative study of machine learning classifiers for secure RF-PUF-based authentication in internet of things

A Ashtari, B Alizadeh - Microprocessors and Microsystems, 2022 - Elsevier
This paper presents a RF-PUF-based authentication framework which exploits the intrinsic
non-idealities in the physical characteristic of devices to generate a unique identity for …

Neural-network-based hardware trojan attack prediction and security defense mechanism<? TeX\break?> in optical networks-on-chip

X He, P Guo, J Zhou, J Li, F Zhang, W Hou… - Journal of Optical …, 2024 - opg.optica.org
Optical networks-on-chip (ONoCs) have emerged as a compelling platform for many-core
systems owing to their notable attributes, including high bandwidth, low latency, and energy …

A Side-Channel Hardware Trojan Detection Method Based on Fuzzy C-Means Clustering and Fusion Distance Algorithms

C He, D Lei, H Wu, L Cheng, G Yan… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the wide application of the Internet of Things technology, the hardware security has
attracted more and more attention from users around the world. Hardware Trojan (HT) of …

Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices.

A Ashtari, A Shabani, B Alizadeh - ISeCure, 2022 - search.ebscohost.com
This paper presents a novel RF-PUF-based authentication scheme, called RKM-PUF which
takes advantage of a dynamic random key generation that depends upon both …