A survey of physical-layer authentication in wireless communications

N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical unclonable functions and applications: A tutorial

C Herder, MD Yu, F Koushanfar… - Proceedings of the …, 2014 - ieeexplore.ieee.org
This paper describes the use of physical unclonable functions (PUFs) in low-cost
authentication and key generation applications. First, it motivates the use of PUFs versus …

Halide perovskite memristors as flexible and reconfigurable physical unclonable functions

RA John, N Shah, SK Vishwanath, SE Ng… - Nature …, 2021 - nature.com
Abstract Physical Unclonable Functions (PUFs) address the inherent limitations of
conventional hardware security solutions in edge-computing devices. Despite impressive …

A puf taxonomy

T McGrath, IE Bagci, ZM Wang, U Roedig… - Applied physics …, 2019 - pubs.aip.org
Authentication is an essential cryptographic primitive that confirms the identity of parties
during communications. For security, it is important that these identities are complex, in order …

Concealable physically unclonable function chip with a memristor array

B Gao, B Lin, Y Pang, F Xu, Y Lu, YC Chiu, Z Liu… - Science …, 2022 - science.org
A physically unclonable function (PUF) is a creditable and lightweight solution to the mistrust
in billions of Internet of Things devices. Because of this remarkable importance, PUF need to …

Physical unclonable functions (PUF) for IoT devices

A Al-Meer, S Al-Kuwari - ACM Computing Surveys, 2023 - dl.acm.org
Physical Unclonable Function (PUF) has recently attracted interest from both industry and
academia as a potential alternative approach to secure Internet of Things (IoT) devices from …

Revisiting silk: a lens-free optical physical unclonable function

MS Kim, GJ Lee, JW Leem, S Choi, YL Kim… - Nature …, 2022 - nature.com
For modern security, devices, individuals, and communications require unprecedentedly
unique identifiers and cryptographic keys. One emerging method for guaranteeing digital …

Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain

U Guin, K Huang, D DiMase, JM Carulli… - Proceedings of the …, 2014 - ieeexplore.ieee.org
As the electronic component supply chain grows more complex due to globalization, with
parts coming from a diverse set of suppliers, counterfeit electronics have become a major …

PUF modeling attacks on simulated and silicon data

U Rührmair, J Sölter, F Sehnke, X Xu… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
We discuss numerical modeling attacks on several proposed strong physical unclonable
functions (PUFs). Given a set of challenge-response pairs (CRPs) of a Strong PUF, the goal …

Fault analysis-based logic encryption

J Rajendran, H Zhang, C Zhang… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
Globalization of the integrated circuit (IC) design industry is making it easy for rogue
elements in the supply chain to pirate ICs, overbuild ICs, and insert hardware Trojans. Due …