Results 181 to 190 of about 155,386 (234)
Some of the next articles are maybe not open access.

Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks

IEEE Internet of Things Journal, 2022
Due to the emergence of heterogeneous Internet of Medical Things (IoMT) (e.g., wearable health devices, smartwatch monitoring, and automated insulin delivery systems), large volumes of patient data are dispatched to central cloud servers for disease ...
Weizheng Wang   +6 more
semanticscholar   +1 more source

A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT

IEEE Sensors Journal, 2021
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the ...
Sensen Li   +3 more
semanticscholar   +1 more source

In-Memory Unified TRNG and Multi-Bit PUF for Ubiquitous Hardware Security

IEEE Journal of Solid-State Circuits, 2022
This work describes an SRAM architecture with in-memory generation of both dynamic and multi-bit static entropy. This inexpensively extends complete key generation capabilities to any system that includes an SRAM, and hence ubiquitously down to tightly ...
Sachin Taneja   +2 more
semanticscholar   +1 more source

PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol

IEEE Transactions on Dependable and Secure Computing, 2021
Physically unclonable functions (PUFs) bind a device's identity to its physical hardware and thus, can be employed for device identification, authentication and cryptographic key generation.
Mahmood Azhar Qureshi, Arslan Munir
semanticscholar   +1 more source

FLAM-PUF: A Response–Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
Physical unclonable functions (PUFs) have been adopted in many resource-constrained Internet of Things (IoT) applications to provide effective and lightweight solutions for device authentication. However, an attacker can collect challenge–response pairs (
Linjun Wu   +5 more
semanticscholar   +1 more source

A Lightweight FPGA Compatible Weak-PUF Primitive Based on XOR Gates

IEEE Transactions on Circuits and Systems - II - Express Briefs, 2022
In this brief we introduce a novel lightweight FPGA compatible Physical Unclonable Function (PUF) primitive based on XOR gates. The proposed XOR-PUF is the most compact FPGA-compatible PUF ever presented in the literature, allowing the implementation of ...
Riccardo Della Sala   +2 more
semanticscholar   +1 more source

A Unified PUF and TRNG Design Based on 40-nm RRAM With High Entropy and Robustness for IoT Security

IEEE Transactions on Electron Devices, 2022
Physically unclonable function (PUF) and true random number generator (TRNG) are the indispensable primitives for the Internet-of-Things (IoT) security. In this article, a highly robust unified PUF $/$ TRNG design is demonstrated.
B. Gao   +5 more
semanticscholar   +1 more source

EV-PUF: Lightweight Security Protocol for Dynamic Charging System of Electric Vehicles Using Physical Unclonable Functions

IEEE Transactions on Network Science and Engineering, 2022
Dynamic charging is a potential technology that would enable electric vehicles to be charged while they are in motion. Significant security and privacy concerns, on the other hand, arise as a result of communications between electric vehicles and a ...
Raveendra Babu Ponnuru   +3 more
semanticscholar   +1 more source

CT PUF: Configurable Tristate PUF Against Machine Learning Attacks for IoT Security

IEEE Internet of Things Journal, 2021
Physical unclonable function (PUF) is a promising lightweight hardware security primitive for resource-limited Internet-of-Things (IoT) devices. Strong PUFs are suitable for lightweight device authentication because it can generate quantities of ...
Jiliang Zhang   +4 more
semanticscholar   +1 more source

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

ACM Trans. Internet Techn., 2021
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency and productivity.
W. Liang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy