Physical unclonable functions (PUF) for IoT devices

A Al-Meer, S Al-Kuwari - ACM Computing Surveys, 2023 - dl.acm.org
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …

Arbiter puf—a review of design, composition, and security aspects

S Hemavathy, VSK Bhaaskaran - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware security modules play a crucial role in protecting and preserving technologically
integrated systems that are used in daily life. They employ cryptographic protocols to secure …

The interpose PUF: Secure PUF design against state-of-the-art machine learning attacks

PH Nguyen, DP Sahoo, C Jin, K Mahmood… - Cryptology ePrint …, 2018 - eprint.iacr.org
The design of a silicon Strong Physical Unclonable Function (PUF) that is lightweight and
stable, and which possesses a rigorous security argument, has been a fundamental problem …

PUF-RAKE: A PUF-based robust and lightweight authentication and key establishment protocol

MA Qureshi, A Munir - IEEE Transactions on Dependable and …, 2021 - ieeexplore.ieee.org
Physically unclonable functions (PUFs) bind a device's identity to its physical hardware and
thus, can be employed for device identification, authentication and cryptographic key …

PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs

M Khalafalla, C Gebotys - 2019 Design, automation & test in …, 2019 - ieeexplore.ieee.org
In the past decade and a half, physical unclonable functions (PUFs) have been introduced
as a promising cryptographic primitive for hardware security applications. Since then, the …

T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT

K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …

A survey on silicon PUFs

F Zerrouki, S Ouchani, H Bouarfa - Journal of Systems Architecture, 2022 - Elsevier
Abstract Integrated Circuits (ICs) and electronic devices have become an integral part of
daily human life (mobile, home, car, etc.). However, specific security measures should be …

Lessons learned: Analysis of PUF-based authentication protocols for IoT

K Lounis, M Zulkernine - Digital Threats: Research and Practice, 2023 - dl.acm.org
The service of authentication constitutes the spine of all security properties. It is the phase
where entities prove their identities to each other and generally establish and derive …

Introducing recurrence in strong PUFs for enhanced machine learning attack resistance

N Shah, D Chatterjee, B Sapui… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Hardware security circuits based on Physically Unclonable Functions (PUF) are finding
widespread use due to increasing adoption of IoT devices. However, existing strong PUFs …

A new arbiter PUF for enhancing unpredictability on FPGA

T Machida, D Yamamoto, M Iwamoto… - The Scientific World …, 2015 - Wiley Online Library
In general, conventional Arbiter‐based Physically Unclonable Functions (PUFs) generate
responses with low unpredictability. The N‐XOR Arbiter PUF, proposed in 2007, is a well …