2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS) 2016
DOI: 10.1109/mwscas.2016.7870046
|View full text |Cite
|
Sign up to set email alerts
|

Overview of PUF-based hardware security solutions for the internet of things

Abstract: The Internet of Things (IoT) consists of numerous interconnected resource-constrained devices such as sensors nodes and actuators, which are linked to the Internet. By 2020 it is anticipated that the IoT paradigm will include approximately 20 billion connected devices. The interconnection of such devices provides the ability to collect a huge amount of data for processing and analysis. A significant portion of the transacted data between IoT devices is private information, which must not in any way be eavesdro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 82 publications
(59 citation statements)
references
References 15 publications
0
59
0
Order By: Relevance
“…PUF is an integrated circuit which produces different outputs when it is implemented on different chips [15]. Manufacturing variability which causes the variation in the property of circuits is inevitable and uncontrollable, which serves PUF unclonability property.…”
Section: Physically Unclonable Functions (Puf)mentioning
confidence: 99%
See 1 more Smart Citation
“…PUF is an integrated circuit which produces different outputs when it is implemented on different chips [15]. Manufacturing variability which causes the variation in the property of circuits is inevitable and uncontrollable, which serves PUF unclonability property.…”
Section: Physically Unclonable Functions (Puf)mentioning
confidence: 99%
“…The UID (uid) is always transmitted securely using Rabin encryption. Even when the uid is compromised, it is not possible to identify the tag from the encrypted message C because the plaintext M is padded with a random number as shown in Equation (15) and encrypted using the public key provided by the reader.…”
Section: Forward Securitymentioning
confidence: 99%
“…There are two sequential steps to accomplish authentication scheme for devices using PUF [4] as described below:…”
Section: Background Of the Problemmentioning
confidence: 99%
“…All the defense mechanisms resist or at least improve the resiliency of the PUFs against the ML-MA however they come with some shortcomings. In the case of design-based defense mechanisms, adding non-linearity using XOR [6], [7], analogizing the digital components [11] and exploiting the FPGA blocks [4], [10] increase the hardware overhead.…”
Section: Background Of the Problemmentioning
confidence: 99%
See 1 more Smart Citation