2020
DOI: 10.1007/s40012-020-00293-5
|View full text |Cite
|
Sign up to set email alerts
|

PUF: a new era in IoT security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Now, EPCGlobal's IoT architecture is the most representative of the well-known IoT architecture. Its main components are EPC coding technology, EPC tags, EPC readers, ONS servers and EPC middleware [12]. Due to the different capabilities of the IoT system architecture, it can be divided into three levels: the perception level, the lower level used to collect information, and the network level, which also belongs to the middle level grade.…”
Section: The Architecture Of the Iotmentioning
confidence: 99%
“…Now, EPCGlobal's IoT architecture is the most representative of the well-known IoT architecture. Its main components are EPC coding technology, EPC tags, EPC readers, ONS servers and EPC middleware [12]. Due to the different capabilities of the IoT system architecture, it can be divided into three levels: the perception level, the lower level used to collect information, and the network level, which also belongs to the middle level grade.…”
Section: The Architecture Of the Iotmentioning
confidence: 99%
“…More crucially, since the PUF can generate the chip-specific secret via a unique response that is only generated upon request by providing a challenge, there is no need to keep a secret Key locally on a device. These characteristics make PUF an excellent choice for IoT devices with minimal resources [17].…”
Section: Introductionmentioning
confidence: 99%