A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Security of IoT systems: Design challenges and opportunities

T Xu, JB Wendt, M Potkonjak - 2014 IEEE/ACM International …, 2014 - ieeexplore.ieee.org
Computer-aided design (CAD), in its quest to facilitate new design revolutions, is again on
the brink of changing its scope. Following both historical and recent technological and …

Hardware trojans: Lessons learned after one decade of research

K **ao, D Forte, Y **, R Karri, S Bhunia… - ACM Transactions on …, 2016 - dl.acm.org
Given the increasing complexity of modern electronics and the cost of fabrication, entities
from around the globe have become more heavily involved in all phases of the electronics …

Mitigating SAT attack on logic locking

Y **e, A Srivastava - … Hardware and Embedded Systems–CHES 2016 …, 2016 - Springer
Logic locking is a technique that has been proposed to protect outsourced IC designs from
piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct …

Anti-SAT: Mitigating SAT attack on logic locking

Y **e, A Srivastava - … on Computer-Aided Design of Integrated …, 2018 - ieeexplore.ieee.org
Logic locking is a technique that is proposed to protect outsourced IC designs from piracy
and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality …

Double DIP: Re-evaluating security of logic encryption algorithms

Y Shen, H Zhou - Proceedings of the on Great Lakes Symposium on …, 2017 - dl.acm.org
Logic encryption is a hardware security technique that uses extra key inputs to lock a given
combinational circuit. A recent study by Subramanyan et al. shows that all existing logic …

Game theory-based authentication framework to secure internet of vehicles with blockchain

M Gupta, R Kumar, S Shekhar, B Sharma, RB Patel… - Sensors, 2022 - mdpi.com
The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse
access methods, IoV enables vehicles to connect with their surroundings. However, without …

Two-factor authentication for IoT with location information

MN Aman, MH Basheer, B Sikdar - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The number of Internet of Things (IoT) devices is expected to grow exponentially in the near
future and produce large amounts of potentially sensitive data. The simple and low cost …

FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures

NN Anandakumar, MS Hashmi, M Tehranipoor - Integration, 2021 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …

Stripped functionality logic locking with Hamming distance-based restore unit (SFLL-hd)–unlocked

F Yang, M Tang, O Sinanoglu - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Logic locking is a technique that has received significant attention. It protects a hardware
design netlist from a variety of hardware security threats, such as tampering, reverse …