A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Physically unclonable functions: A study on the state of the art and future research directions

R Maes, I Verbauwhede - Towards Hardware-Intrinsic Security …, 2010 - Springer
The idea of using intrinsic random physical features to identify objects, systems, and people
is not new. Fingerprint identification of humans dates at least back to the nineteenth century …

Lightweight and privacy-preserving two-factor authentication scheme for IoT devices

P Gope, B Sikdar - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT
devices are deployed in the open and public places, which makes them vulnerable to …

Security and privacy in the internet of things

C Maple - Journal of cyber policy, 2017 - Taylor & Francis
The internet of things (IoT) is a technology that has the capacity to revolutionise the way that
we live, in sectors ranging from transport to health, from entertainment to our interactions …

Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database

U Chatterjee, V Govindan, R Sadhukhan… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …

FPGA intrinsic PUFs and their use for IP protection

J Guajardo, SS Kumar, GJ Schrijen, P Tuyls - Cryptographic Hardware and …, 2007 - Springer
In recent years, IP protection of FPGA hardware designs has become a requirement for
many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different …

Power-up SRAM state as an identifying fingerprint and source of true random numbers

DE Holcomb, WP Burleson, K Fu - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Intermittently powered applications create a need for low-cost security and privacy in
potentially hostile environments, supported by primitives including identification and random …

The butterfly PUF protecting IP on every FPGA

SS Kumar, J Guajardo, R Maes… - … Security and Trust, 2008 - ieeexplore.ieee.org
IP protection of hardware designs is the most important requirement for many FPGA IP
vendors. To this end, various solutions have been proposed by FPGA manufacturers based …

The DRAM latency PUF: Quickly evaluating physical unclonable functions by exploiting the latency-reliability tradeoff in modern commodity DRAM devices

JS Kim, M Patel, H Hassan… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are commonly used in cryptography to identify
devices based on the uniqueness of their physical microstructures. DRAM-based PUFs have …

Counterfeit integrated circuits: Detection, avoidance, and the challenges ahead

U Guin, D DiMase, M Tehranipoor - Journal of Electronic Testing, 2014 - Springer
The counterfeiting of electronic components has become a major challenge in the 21st
century. The electronic component supply chain has been greatly affected by widespread …