Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review

PO Ajiboye, KOBO Agyekum, EA Frimpong - Journal of Engineering and …, 2024 - Springer
The traditional electrical grid has to be digitally improved as digitalization and effective
integration of renewable energy bring better efficiency, intelligence, and safety into the grid; …

Low-cost security for next-generation IoT networks

NA Anagnostopoulos, S Ahmad, T Arul… - ACM Transactions on …, 2020 - dl.acm.org
In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the
pervasive character of next-generation communication protocols, such as the 5G …

SRAM has no chill: exploiting power domain separation to steal on-chip secrets

J Mahmod, M Hicks - Proceedings of the 27th ACM International …, 2022 - dl.acm.org
The abundance of embedded systems and smart devices increases the risk of physical
memory disclosure attacks. One such classic non-invasive attack exploits dynamic RAM's …

Data Remanence Based Approach towards Stable Key Generation from Physically Unclonable Function Response of Embedded SRAMs using Binary Search

PP Aung, N Ismail, CY Ooi, K Mashiko… - … in Applied Sciences …, 2024 - semarakilmu.com.my
Today's device authentications in IoT devices use public and private key cryptography.
Nevertheless, they are still vulnerable to threats because keys or device IDs digitally stored …

A Power-Gated 8-Transistor Physically Unclonable Function Accelerates Evaluation Speeds

Y Zheng, A Yakovlev, A Bystrov - Journal of Low Power Electronics and …, 2023 - mdpi.com
The proposed 8-Transistor (8T) Physically Unclonable Function (PUF), in conjunction with
the power gating technique, can significantly accelerate a single evaluation cycle more than …

A Rapid Reset 8-Transistor Physically Unclonable Function Utilising Power Gating

Y Zheng, A Bystrov, A Yakovlev - 2023 Design, Automation & …, 2023 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) need error correction whilst regenerating Secret
Keys in cryptography. The proposed 8-Transistor (8T) PUF, which coordinates with the …

Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network

A Anand, JP Singh - Proceedings of the Indian National Science Academy, 2024 - Springer
With the deployment of the Internet of Things (IoT) networks, numerous IoT devices are
placed in remote and often untrusted locations, such as open or wild environments. The …

Testing Temperature-Dependent Resistors as Potential Physical Unclonable Functions

EM Bahoum, N Mexis, S Katzenbeisser… - 2024 IEEE 10th …, 2024 - ieeexplore.ieee.org
This work investigates the potential of temperature-dependent resistors to serve as Physical
Unclonable Functions (PUFs). Five types of temperature-dependent resistors were …

Ultra-fast data sanitization of SRAM by back-biasing to resist a cold boot attack

SJ Han, JK Han, GJ Yun, MW Lee, JM Yu, YK Choi - Scientific reports, 2022 - nature.com
Although SRAM is a well-established type of volatile memory, data remanence has been
observed at low temperature even for a power-off state, and thus it is vulnerable to a …

A Novel Design Technique for Enhanced Security and New Applications of Ferroelectric-Based Non-Volatile SRAM

L Rhetat, JP Noel, B Giraud… - 2024 IFIP/IEEE 32nd …, 2024 - ieeexplore.ieee.org
Static Random Access Memories (SRAM) are fast and efficient circuits used as the main
working memory of processing units. However, associating these volatile memories with …