Machine learning-enabled internet of things (iot): Data, applications, and industry perspective

J Bzai, F Alam, A Dhafer, M Bojović, SM Altowaijri… - Electronics, 2022 - mdpi.com
Machine learning (ML) allows the Internet of Things (IoT) to gain hidden insights from the
treasure trove of sensed data and be truly ubiquitous without explicitly looking for knowledge …

Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

PUF-RAKE: A PUF-based robust and lightweight authentication and key establishment protocol

MA Qureshi, A Munir - IEEE Transactions on Dependable and …, 2021 - ieeexplore.ieee.org
Physically unclonable functions (PUFs) bind a device's identity to its physical hardware and
thus, can be employed for device identification, authentication and cryptographic key …

Reliable and modeling attack resistant authentication of arbiter PUF in FPGA implementation with trinary quadruple response

SS Zalivaka, AA Ivaniuk… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Field programmable gate array (FPGA) is a potential hotbed for malicious and counterfeit
hardware infiltration. Arbiter-based physical unclonable function (A-PUF) has been widely …

A new arbiter PUF for enhancing unpredictability on FPGA

T Machida, D Yamamoto, M Iwamoto… - The Scientific World …, 2015 - Wiley Online Library
In general, conventional Arbiter‐based Physically Unclonable Functions (PUFs) generate
responses with low unpredictability. The N‐XOR Arbiter PUF, proposed in 2007, is a well …

A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation

C Gu, W Liu, Y Cui, N Hanley… - … on Emerging Topics …, 2019 - ieeexplore.ieee.org
A PUF is a physical security primitive that allows to extract intrinsic digital identifiers from
electronic devices. It is a promising candidate to improve security in lightweight devices …

{COMA}: Communication and Obfuscation Management Architecture

KZ Azar, F Farahmand, HM Kamali… - … on Research in Attacks …, 2019 - usenix.org
In this paper, we introduce a novel Communication and Obfuscation Management
Architecture (COMA) to handle the storage of the obfuscation key and to secure the …

Design and evaluation of XOR arbiter physical unclonable function and its implementation on FPGA in hardware security applications

R Naveenkumar, NM Sivamangai, A Napolean… - Journal of Electronic …, 2022 - Springer
Hardware security has become most prevalent challenging concept of improving the Internet
of Things (IoT) in human routine as well as in future engineering processes. IoT systems …

Implementation, characterization and application of path changing switch based arbiter PUF on FPGA as a lightweight security primitive for IoT

MH Mahalat, S Mandal, A Mondal, B Sen… - ACM Transactions on …, 2021 - dl.acm.org
Secure authentication of any Internet-of-Things (IoT) device becomes the utmost necessity
due to the lack of specifically designed IoT standards and intrinsic vulnerabilities with limited …

PUF-based anonymous authentication scheme for hardware devices and IPs in edge computing environment

J Long, W Liang, KC Li, D Zhang, M Tang, H Luo - IEEE Access, 2019 - ieeexplore.ieee.org
With rapid advances in edge computing and the Internet of Things, the security of low-layer
hardware devices attract more and more attention. As an ideal hardware solution, field …