Security of IoT systems: Design challenges and opportunities

T Xu, JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014‏ - ieeexplore.ieee.org
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …

[HTML][HTML] Game theory-based authentication framework to secure internet of vehicles with blockchain

M Gupta, R Kumar, S Shekhar, B Sharma, RB Patel… - Sensors, 2022‏ - mdpi.com
The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse
access methods, IoV enables vehicles to connect with their surroundings. However, without …

Hardware obfuscation using PUF-based logic

JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014‏ - ieeexplore.ieee.org
There is a great need to develop universal and robust techniques for intellectual property
protection of integrated circuits. In this paper, we introduce techniques for the obfuscation of …

Position paper: Physical unclonable functions for iot security

MN Aman, KC Chua, B Sikdar - … of the 2nd ACM international workshop …, 2016‏ - dl.acm.org
Devices in the Internet of Things (IoT) introduce unique security challenges due to their
operating conditions and device limitations. Existing security solutions based on classical …

Design and analysis of stability-guaranteed PUFs

WC Wang, Y Yona, SN Diggavi… - IEEE Transactions on …, 2017‏ - ieeexplore.ieee.org
The lack of stability is one of the limitations that constrain physical unclonable function (PUF)
from being put in widespread practical use. In this paper, we propose a weak PUF and a …

Strengthening industrial IoT security with integrated puf token

S Jain, AR Korenda, A Bagri, B Cambou… - Proceedings of the Future …, 2024‏ - Springer
In the ever-evolving landscape of IoT device security, safeguarding data with confidentiality
and integrity stands as a paramount concern. This paper introduces an optimized approach …

Active hardware metering by finite state machine obfuscation

F Koushanfar - Hardware protection through obfuscation, 2017‏ - Springer
This chapter presents a detailed description and comprehensive discussion of the first
known method for active IC metering and IC piracy prevention which allow uniquely locking …

A digital PUF-based IP protection architecture for network embedded systems

JX Zheng, M Potkonjak - Proceedings of the tenth ACM/IEEE symposium …, 2014‏ - dl.acm.org
In this paper we present an architecture for a secure embedded system that is resilient to
tempering and code injection attacks and offers anti-piracy protection for the software and …

LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity

WC Wang, Y Yona, S Diggavi… - 2016 IEEE International …, 2016‏ - ieeexplore.ieee.org
Stability has always been one of the major limitations that constraints Physical Unclonable
Function (PUF) from being put in widespread practical use. In this paper, we propose a weak …

A fully digital physical unclonable function based temperature sensor for secure remote sensing

Y Cao, Y Guo, B Liu, W Ge, M Zhu… - 2018 27th International …, 2018‏ - ieeexplore.ieee.org
Turnkey solutions that combine energy-efficient remote sensing and secure communication
of telemetry are desirable in data collection, risk control and situation appraisal with the …