2018 1st International Conference on Data Intelligence and Security (ICDIS) 2018
DOI: 10.1109/icdis.2018.00013
|View full text |Cite
|
Sign up to set email alerts
|

Proof of Concept for IoT Device Authentication Based on SRAM PUFs Using ATMEGA 2560-MCU

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…In general, we note that other works have discussed in depth the ability of memory-based PUFs, such as SRAM PUFs [113,145,146,185,186], DRAM-based PUFs [79,82,85,86,88,143,144,158,159], and Flash-memory-based PUFs [161,162], to provide adequate security under nominal conditions.…”
Section: Memory-based Pufs Under Nominal Conditionsmentioning
confidence: 92%
See 2 more Smart Citations
“…In general, we note that other works have discussed in depth the ability of memory-based PUFs, such as SRAM PUFs [113,145,146,185,186], DRAM-based PUFs [79,82,85,86,88,143,144,158,159], and Flash-memory-based PUFs [161,162], to provide adequate security under nominal conditions.…”
Section: Memory-based Pufs Under Nominal Conditionsmentioning
confidence: 92%
“…In 2018, Lipps et al [113] presented a proof-of-concept implementation of an SRAM PUF-based protocol for IoT device authentication using a COTS device. The authors note that the large number of interconnected devices allows for an increased number of attacks against the IoT, and propose the usage of SRAM PUFs as security primitives for the implementation of symmetric key cryptography and device authentication.…”
Section: Work Relevant To the Role Of Pufs As Security Mechanisms For...mentioning
confidence: 99%
See 1 more Smart Citation
“…The results from both studies show that the SUVs have a good entropy that can uniquely distinguish each chip. Elsewhere, microcontrollers in Arduino platforms have been used for a proof-of-concept of internet-of-things (IoT) device authentication [17]- [19]. Besides, the on-chip SRAM in ATMega328P microcontroller devices have been used as a case study to perform invasive attacks as discussed in [20], [21].…”
Section: Related Workmentioning
confidence: 99%
“…When it comes to Machine-to-Machine (M2M) and Machine-to-Service(M2S) applications, the approaches are focused on certificates, Hardware Security Modules (HSMs) and Trusted Platform Modules (TPMs), as well as encryption in general. Besides there are approaches with respect to Physical Layer Security (PhySec) aiming to utilize various physical characteristics of semiconductors (Lipps, et al, 2018) and the wireless propagation channel (Lipps, et al, 2020b) to authenticate devices and to derive cryptographic primitives. For all humanrelated scenarios, by contrast, biometric methods are (actually exclusively) appropriate.…”
Section: The Industrial Internet Of Things and The Matter Of Authenti...mentioning
confidence: 99%