A review of physical unclonable functions (PUFs) and its applications in IoT environment

A Yadav, S Kumar, J Singh - Ambient Communications and Computer …, 2022 - Springer
This paper describes various studies about physical unclonable functions, and it inspires
use of physical unclonable functions over conventional security mechanisms and compares …

An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Physical unclonable functions

Y Gao, SF Al-Sarawi, D Abbott - Nature Electronics, 2020 - nature.com
A physical unclonable function (PUF) is a device that exploits inherent randomness
introduced during manufacturing to give a physical entity a unique 'fingerprint'or trust anchor …

[KNJIGA][B] Physically unclonable functions: Concept and constructions

R Maes, R Maes - 2013 - Springer
This chapter introduces the reader to the basic concept of a physically unclonable function
or PUF. Many research results on this topic were published over recent years in a variety of …

Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions

P Gope, J Lee, TQS Quek - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …

[HTML][HTML] Physical unclonable functions in the internet of things: State of the art and open challenges

A Babaei, G Schiele - Sensors, 2019 - mdpi.com
Attacks on Internet of Things (IoT) devices are on the rise. Physical Unclonable Functions
(PUFs) are proposed as a robust and lightweight solution to secure IoT devices. The main …

The gap between promise and reality: On the insecurity of XOR arbiter PUFs

GT Becker - … Hardware and Embedded Systems--CHES 2015: 17th …, 2015 - Springer
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based
RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol …

Helper data algorithms for PUF-based key generation: Overview and analysis

J Delvaux, D Gu, D Schellekens… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is
challenging for low-cost resource-constrained embedded devices, with an attacker having …

Machine-learning attacks on polypufs, ob-pufs, rpufs, lhs-pufs, and puf–fsms

J Delvaux - IEEE Transactions on Information Forensics and …, 2019 - ieeexplore.ieee.org
A physically unclonable function (PUF) is a circuit of which the input-output behavior is
designed to be sensitive to the random variations of its manufacturing process. This building …

A PUF-based secure communication protocol for IoT

U Chatterjee, RS Chakraborty… - ACM Transactions on …, 2017 - dl.acm.org
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …