PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

In-memory computing with resistive switching devices

D Ielmini, HSP Wong - Nature electronics, 2018 - nature.com
Modern computers are based on the von Neumann architecture in which computation and
storage are physically separated: data are fetched from the memory unit, shuttled to the …

Tunable stochastic memristors for energy-efficient encryption and computing

KS Woo, J Han, S Yi, L Thomas, H Park… - Nature …, 2024 - nature.com
Abstract Information security and computing, two critical technological challenges for post-
digital computation, pose opposing requirements–security (encryption) requires a source of …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Structural color materials for optical anticounterfeiting

W Hong, Z Yuan, X Chen - Small, 2020 - Wiley Online Library
The counterfeiting of goods is growing worldwide, affecting practically any marketable item
ranging from consumer goods to human health. Anticounterfeiting is essential for …

Halide perovskite memristors as flexible and reconfigurable physical unclonable functions

RA John, N Shah, SK Vishwanath, SE Ng… - Nature …, 2021 - nature.com
Abstract Physical Unclonable Functions (PUFs) address the inherent limitations of
conventional hardware security solutions in edge-computing devices. Despite impressive …

Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication

Y Liu, F Han, F Li, Y Zhao, M Chen, Z Xu… - Nature …, 2019 - nature.com
An ideal anti-counterfeiting technique has to be inexpensive, mass-producible,
nondestructive, unclonable and convenient for authentication. Although many anti …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

A survey of physical-layer authentication in wireless communications

N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …