Physically unclonable functions: A study on the state of the art and future research directions

R Maes, I Verbauwhede - Towards Hardware-Intrinsic Security …, 2010 - Springer
The idea of using intrinsic random physical features to identify objects, systems, and people
is not new. Fingerprint identification of humans dates at least back to the nineteenth century …

On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …

A puf taxonomy

T McGrath, IE Bagci, ZM Wang, U Roedig… - Applied physics …, 2019 - pubs.aip.org
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …

Revisiting silk: a lens-free optical physical unclonable function

MS Kim, GJ Lee, JW Leem, S Choi, YL Kim… - Nature …, 2022 - nature.com
For modern security, devices, individuals, and communications require unprecedentedly
unique identifiers and cryptographic keys. One emerging method for guaranteeing digital …

RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning

B Chatterjee, D Das, S Maity… - IEEE internet of things …, 2018 - ieeexplore.ieee.org
Traditional authentication in radio-frequency (RF) systems enable secure data
communication within a network through techniques such as digital signatures and hash …

[图书][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

Power-up SRAM state as an identifying fingerprint and source of true random numbers

DE Holcomb, WP Burleson, K Fu - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …

Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions

TJ Bihl, KW Bauer, MA Temple - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The proliferation of low-cost IEEE 802.15. 4 ZigBee wireless devices in critical infrastructure
applications presents security challenges. Network security commonly relies on bit-level …

Security based on physical unclonability and disorder

U Rührmair, S Devadas, F Koushanfar - Introduction to Hardware Security …, 2011 - Springer
Identification, authentication, and integrity checking are important tasks for ensuring the
security and protection of valuable objects, devices, programs, and data. The utilization of …

A survey on silicon PUFs and recent advances in ring oscillator PUFs

JL Zhang, G Qu, YQ Lv, Q Zhou - Journal of computer science and …, 2014 - Springer
Silicon physical unclonable function (PUF) is a popular hardware security primitive that
exploits the intrinsic variation of IC manufacturing process to generate chip-unique …