Survey on multi-access edge computing security and privacy

P Ranaweera, AD Jurcut… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm
of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in …

Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management

I Lee - Future internet, 2020 - mdpi.com
Along with the growing threat of cyberattacks, cybersecurity has become one of the most
important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce …

In‐sensor computing: materials, devices, and integration technologies

T Wan, B Shao, S Ma, Y Zhou, Q Li… - Advanced materials, 2023 - Wiley Online Library
The number of sensor nodes in the Internet of Things is growing rapidly, leading to a large
volume of data generated at sensory terminals. Frequent data transfer between the sensors …

Physical unclonable functions

Y Gao, SF Al-Sarawi, D Abbott - Nature Electronics, 2020 - nature.com
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …

Graphene-based physically unclonable functions that are reconfigurable and resilient to machine learning attacks

A Dodda, S Subbulakshmi Radhakrishnan… - Nature …, 2021 - nature.com
Graphene has a range of properties that makes it suitable for building devices for the
Internet of Things. However, the deployment of such devices will also likely require the …

Edible unclonable functions

JW Leem, MS Kim, SH Choi, SR Kim, SW Kim… - Nature …, 2020 - nature.com
Counterfeit medicines are a fundamental security problem. Counterfeiting medication poses
a tremendous threat to patient safety, public health, and the economy in developed and less …

Secure electronics enabled by atomically thin and photosensitive two-dimensional memtransistors

A Oberoi, A Dodda, H Liu, M Terrones, S Das - ACS nano, 2021 - ACS Publications
The rapid proliferation of security compromised hardware in today's integrated circuit (IC)
supply chain poses a global threat to the reliability of communication, computing, and control …

Voxelated opto-physically unclonable functions via irreplicable wrinkles

K Kim, SU Kim, MY Choi, MH Saeed, Y Kim… - Light: Science & …, 2023 - nature.com
The increased prevalence of the Internet of Things (IoT) and the integration of digital
technology into our daily lives have given rise to heightened security risks and the need for …

Security considerations for Internet of Things: A survey

A Jurcut, T Niculcea, P Ranaweera, NA Le-Khac - SN Computer Science, 2020 - Springer
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators,
mobiles, computers, meters, or even vehicles is a critical requirement for the current era …

A retrospective and a look forward: Fifteen years of physical unclonable function advancement

CH Chang, Y Zheng, L Zhang - IEEE Circuits and Systems …, 2017 - ieeexplore.ieee.org
Severe security threats and alerts associated with the use of smart devices have drawn
increasing public attentions since the inception of Internet of Things (IoT) in late 1990s. IoT …