A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

Review of error correction for PUFs and evaluation on state-of-the-art FPGAs

M Hiller, L Kürzinger, G Sigl - Journal of cryptographic engineering, 2020 - Springer
Efficient error correction and key derivation is a prerequisite to generate secure and reliable
keys from PUFs. The most common methods can be divided into linear schemes and pointer …

A proof of concept SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices

AR Korenda, F Afghah, B Cambou… - 2019 16th Annual …, 2019 - ieeexplore.ieee.org
This paper provides a proof of concept for using SRAM based Physically Unclonable
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …

Use of thermistor temperature sensors for cyber-physical system security

C Labrado, H Thapliyal, S Prowell, T Kuruganti - Sensors, 2019 - mdpi.com
The last few decades have seen a large proliferation in the prevalence of cyber-physical
systems. This has been especially highlighted by the explosive growth in the number of …

A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions

AR Korenda, F Afghah… - 2018 14th International …, 2018 - ieeexplore.ieee.org
Some of the main challenges towards utilizing conventional cryptographic techniques in
Internet of Things (IoT) include the need for generating secret keys for such a large-scale …

[PDF][PDF] A survey on hardware-based security mechanisms for internet of things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Ar**v. org, 2019 - par.nsf.gov
This paper provides a proof of concept for using SRAM based Physically Unclonable
Functions (PUFs) to generate private keys for IoT devices. PUFs are utilized, as there is …

A multilevel coding scheme for multi-valued physical unclonable functions

S Müelich, H Mandry, M Ortmanns… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) produce responses by exploiting randomness that
intrinsically occurs in integrated circuits due to uncontrollable variations in the manufacturing …

X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices

E Liberati, A Visintin, R Lazzeretti, M Conti… - … Conference on Applied …, 2024 - Springer
Abstract The Internet of Things rapid growth poses privacy and security challenges for the
traditional key storage methods. Physical Unclonable Functions offer a potential solution but …

Fuzzy key generator design using reram-based physically unclonable functions

AR Korenda, F Afghah, A Razi… - 2021 IEEE Physical …, 2021 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) are used to create unique device identifiers from their
inherent fabrication variability. Unstable readings and variation of the PUF response over …

Physical unclonable functions with improved robustness based on polar codes

Y Bai, Z Yan - 2017 IEEE International Workshop on Signal …, 2017 - ieeexplore.ieee.org
Since physical unclonable functions (PUFs) are considered for various security applications
such as authentication and key generation, the robustness of PUFs is vital. In prior works …