-
261
Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments
Published 2023-02-01“…The proposed scheme utilizes physical unclonable function (PUF) to give drones uniqueness and resistance against drone stolen attacks. …”
Get full text
Article -
262
A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF
Published 2022-03-01“…Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol design because it can ensure a tamper-evident feature. …”
Get full text
Article -
263
A lightweight PUF-based secure group key agreement protocol for wireless sensor networks
Published 2024“…As group messaging is commonly used in WSNs for efficient message exchanges among sensor nodes, this paper presents a lightweight secure group key agreement protocol using Physical Unclonable Function (PUF) as a hardware root of trust. …”
Get full text
Conference Paper -
264
A PUF-based data-device hash for tampered image detection and source camera identification
Published 2020“…The proposed image hash is generated by projecting the invariant image features into a physical unclonable function (PUF)-defined Bernoulli random space. …”
Get full text
Journal Article -
265
Reliable and modeling attack resistant authentication of Arbiter PUF in FPGA implementation with trinary quadruple response
Published 2020“…Arbiter-based physical unclonable function (A-PUF) has been widely regarded as a suitable lightweight security primitive for FPGA bitstream encryption and device authentication. …”
Get full text
Journal Article -
266
Spectral sensitivity near exceptional points as a resource for hardware encryption
Published 2023-02-01“…In this work the authors demonstrate that the spectral sensitivity near exceptional points can be harnessed in electronic circuits to implement physically unclonable functions for security and communication applications.…”
Get full text
Article -
267
-
268
Chemical unclonable functions based on operable random DNA pools
Published 2024-04-01“…Abstract Physical unclonable functions (PUFs) based on unique tokens generated by random manufacturing processes have been proposed as an alternative to mathematical one-way algorithms. …”
Get full text
Article -
269
Laser printed microelectronics
Published 2023-02-01“…Here, the authors propose laser printing as a facile process for fabricating printed electronics with minimum feature sizes below 1 µm and demonstrate functional diodes, memristors, and physically unclonable functions.…”
Get full text
Article -
270
Circuit design for security in internet-of-things application
Published 2018“…Physically Unclonable Functions (PUF) have been an interest in the security technology world. …”
Get full text
Final Year Project (FYP) -
271
Study of a New Method of Radio-Sensor Identification of Radio-Electronic Devices
Published 2023-07-01“…The purpose of this work is to increase the protection of radio-electronic devices from illegal cloning, by studying a new physically unclonable functions (PUF) connected with the own electromagnetic radiation of a radio-electronic device. …”
Get full text
Article -
272
A PUF-based cryptographic security solution for IoT systems on chip
Published 2020-11-01“…The mechanism employed in this approach uses physically unclonable functions (PUF) and symmetric cryptography in order to encrypt the transferred messages within the SoC between the microprocessor and its peripherals. …”
Get full text
Article -
273
Quantum Logic Locking for Security
Published 2023-07-01“…In particular, we review physically unclonable functions (PUFs), obfuscation, and introduce quantum logic locking (QLL). …”
Get full text
Article -
274
Deep learning enhanced anti-counterfeiting security tags made from thin films
Published 2023“…In this paper, we focus specifically on physical anti-counterfeiting methods and investigate the feasibility of using machine learning to improve the accuracy and efficiency of identifying and authenticating Physical Unclonable Functions (PUFs). Our study aims to enhance existing solutions by exploring the potential of machine learning models in the context of PUFs. …”
Get full text
Final Year Project (FYP) -
275
Machine learning and hardware security : challenges and opportunities
Published 2021“…This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. Later, practical model extraction attack based on electromagnetic side-channel measurements are demonstrated followed by a discussion of strategies to protect proprietary models by watermarking them.…”
Get full text
Journal Article -
276
Remote inspection of adversary-controlled environments
Published 2023-10-01“…Our technique extends to large physical systems the application of physical unclonable functions for integrity protection. Its main applications are scenarios where parties are mutually distrustful and have privacy and security constraints. …”
Get full text
Article -
277
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
Published 2022-12-01“…To achieve these privacy levels, we use Physically Unclonable Functions (PUFs) to assure that the internal secret of the tag remains hidden from an adversary with invasive capabilities. …”
Get full text
Article -
278
Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN
Published 2023-12-01“…The algorithm uses physical unclonable functions and optimized Q-learning to ensure that the transmission path is reliable. …”
Get full text
Article -
279
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy
Published 2020-12-01“…A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. …”
Get full text
Article -
280
SRAM-Based PUF Readouts
Published 2023-05-01“…Abstract Large-scale parameter characterization of Physical Unclonable Functions (PUFs) is of paramount importance in order to assess the quality and thus the suitability of such PUFs which would then be developed as an industrial-grade solution for hardware root of trust. …”
Get full text
Article