Blockchain-based applications necessitate the authentication of connected devices if they are employed as blockchain oracles. Alongside identity authentication, it is crucial to ensure …
The integration of IoT devices is becoming increasingly inevitable in the development of next- generation systems and applications. Due to such a wide adoption, IoT devices handle large …
The use of physical unclonable functions (PUFs) linked to the manufacturing process of the electronic devices supporting applications that exchange critical data over the Internet has …
X Ma, P Wang, G Li, Z Zhou - Microelectronics Journal, 2023 - Elsevier
Physical unclonable function (PUF) is a hardware security primitive with significant application potential. However, strong PUF is vulnerable to machine learning attacks based …
Physical Unclonable Functions (PUFs) have been widely considered an attractive security primitive. They use the deviations in the fabrication process to have unique responses from …
Physical Unclonable Functions (PUFs) are lightweight security primitives capable of providing functionalities such as device authentication and identification. Such lightweight …
B Zhu, X Jiang, K Huang, M Yu - Sensors, 2023 - mdpi.com
Physical Unclonable Functions (PUFs) are significant in building lightweight Internet of Things (IoT) authentication protocols. However, PUFs are susceptible to attacks such as …
S Rajput, J Dofe - … on Cyber Security and Resilience (CSR), 2023 - ieeexplore.ieee.org
The widespread adoption of Internet of Things (IoT) devices across various application domains has significantly improved quality of life. However, the resource-constrained …
Resource-constrains are a significant challenge when designing secure IoT devices. To address this problem, the Physical Unclonable Function (PUF) has been proposed as a …