Designing secure PUF-based authentication protocols for constrained environments

SW Lee, M Safkhani, Q Le, OH Ahmed… - Scientific Reports, 2023‏ - nature.com
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …

D2D-MAP: A drone to drone authentication protocol using physical unclonable functions

K Lounis, SHH Ding… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …

Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT

X Zhang, D Gu, T Wang, Y Huang - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
The Internet of Things (IoT) facilitates the information exchange between people and smart
devices. It needs cryptographic measures to secure its communications and interconnected …

Securing Synchrophasors Using Data Provenance in the Quantum Era

K Javed, MA Khan, M Ullah, MN Aman… - IEEE Open Journal of …, 2024‏ - ieeexplore.ieee.org
Trust in the fidelity of synchrophasor measurements is crucial for the correct operation of
modern power grids. While most of the existing research on data provenance focuses on the …

Group Secret Key Generation Using Physical Layer Security for UAV Swarm Communications

S Jangsher, A Al-Dweik, Y Iraqi… - … on Aerospace and …, 2023‏ - ieeexplore.ieee.org
In unmanned aerial vehicle (UAV) swarm networks, a group secret key (GSK) is required to
enable secured UAV–UAV communications, multicast, and broadcast transmission …

On security best practices, systematic analysis of security advice, and internet of things devices

C Bellman - 2022‏ - repository.library.carleton.ca
Abstract While Internet of Things (IoT) security best practices have recently attracted
considerable attention from industry and governments, academic research has highlighted …

Development of a 2–4 Double Arbiter PUF Design on FPGA with Enhanced Performance

S Yavuz, E Naroska, K Daniel - 2024 IEEE SENSORS, 2024‏ - ieeexplore.ieee.org
Implementation of delay-based Physical Unclonable Functions (PUFs) on FPGAs poses
significant challenges due to high requirements, such as the generation of unique and …

[PDF][PDF] A Survey on Edge Computing (Ec) Security Challenges: Classification, Threats, and Mitigation Strategies

AM Sheikh, MR Islam, MH Habaebi, SA Zabidi… - 2025‏ - preprints.org
Edge computing (EC) is a distributed computing approach to processing data at the network
edge, either by the device or a local server, instead of centralized data centers or the cloud …

Security of Connected Devices: Challenges and Solutions

S Chollet, A Desuert, D Hély, L Pion - Smart and Agile Cybersecurity …, 2024‏ - igi-global.com
Connected devices have become increasingly prevalent in the daily lives of human users,
forming the basis of smart spaces designed to provide valuable services, such as remote …

[PDF][PDF] An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage

C De Pauw, JT Mühlberg, JM Dricot - Challenge, 2024‏ - scitepress.org
The IoT technology allows many types of personal data to be measured by many kinds of
devices and sensors, and to be sent over the Internet for various applications. However, this …