A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
M Hiller, L Kürzinger, G Sigl - Journal of cryptographic engineering, 2020 - Springer
Efficient error correction and key derivation is a prerequisite to generate secure and reliable
keys from PUFs. The most common methods can be divided into linear schemes and pointer …
keys from PUFs. The most common methods can be divided into linear schemes and pointer …
A proof of concept SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices
This paper provides a proof of concept for using SRAM based Physically Unclonable
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …
Use of thermistor temperature sensors for cyber-physical system security
The last few decades have seen a large proliferation in the prevalence of cyber-physical
systems. This has been especially highlighted by the explosive growth in the number of …
systems. This has been especially highlighted by the explosive growth in the number of …
A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions
Some of the main challenges towards utilizing conventional cryptographic techniques in
Internet of Things (IoT) include the need for generating secret keys for such a large-scale …
Internet of Things (IoT) include the need for generating secret keys for such a large-scale …
[PDF][PDF] A survey on hardware-based security mechanisms for internet of things
This paper provides a proof of concept for using SRAM based Physically Unclonable
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …
A multilevel coding scheme for multi-valued physical unclonable functions
S Müelich, H Mandry, M Ortmanns… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) produce responses by exploiting randomness that
intrinsically occurs in integrated circuits due to uncontrollable variations in the manufacturing …
intrinsically occurs in integrated circuits due to uncontrollable variations in the manufacturing …
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
Abstract The Internet of Things rapid growth poses privacy and security challenges for the
traditional key storage methods. Physical Unclonable Functions offer a potential solution but …
traditional key storage methods. Physical Unclonable Functions offer a potential solution but …
Fuzzy key generator design using reram-based physically unclonable functions
Physical unclonable functions (PUFs) are used to create unique device identifiers from their
inherent fabrication variability. Unstable readings and variation of the PUF response over …
inherent fabrication variability. Unstable readings and variation of the PUF response over …
Physical unclonable functions with improved robustness based on polar codes
Y Bai, Z Yan - 2017 IEEE International Workshop on Signal …, 2017 - ieeexplore.ieee.org
Since physical unclonable functions (PUFs) are considered for various security applications
such as authentication and key generation, the robustness of PUFs is vital. In prior works …
such as authentication and key generation, the robustness of PUFs is vital. In prior works …