Physical unclonable functions (PUF) for IoT devices

A Al-Meer, S Al-Kuwari - ACM Computing Surveys, 2023 - dl.acm.org
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …

FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures

NN Anandakumar, MS Hashmi, M Tehranipoor - Integration, 2021 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …

CT PUF: Configurable tristate PUF against machine learning attacks for IoT security

J Zhang, C Shen, Z Guo, Q Wu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for
resource-limited Internet-of-Things (IoT) devices. Strong PUFs are suitable for lightweight …

Neural network modeling attacks on arbiter-PUF-based designs

N Wisiol, B Thapaliya, KT Mursi… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
By revisiting, improving, and extending recent neural-network based modeling attacks on
XOR Arbiter PUFs from the literature, we show that XOR Arbiter PUFs,(XOR) Feed-Forward …

Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

Modeling-attack-resistant strong PUF exploiting stagewise obfuscated interconnections with improved reliability

C Xu, L Zhang, MK Law, X Zhao, PI Mak… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
This article presents an obfuscated-interconnection physical unclonable function (OIPUF) to
resist modeling attacks. By introducing nonlinear operations through exploiting the random …

A lightweight puf-based authentication protocol using secret pattern recognition for constrained iot devices

TA Idriss, HA Idriss, MA Bayoumi - IEEE Access, 2021 - ieeexplore.ieee.org
PUFs, or physical unclonable functions, are hardware security primitives that can offer
lightweight security solutions for constrained devices through challenge-response …

Proof-of-puf enabled blockchain: Concurrent data and device security for internet-of-energy

R Asif, K Ghanem, J Irvine - Sensors, 2020 - mdpi.com
A detailed review on the technological aspects of Blockchain and Physical Unclonable
Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain …

A survey on silicon PUFs

F Zerrouki, S Ouchani, H Bouarfa - Journal of Systems Architecture, 2022 - Elsevier
Abstract Integrated Circuits (ICs) and electronic devices have become an integral part of
daily human life (mobile, home, car, etc.). However, specific security measures should be …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …