Results 181 to 190 of about 155,386 (234)
Some of the next articles are maybe not open access.
Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
IEEE Internet of Things Journal, 2022Due to the emergence of heterogeneous Internet of Medical Things (IoMT) (e.g., wearable health devices, smartwatch monitoring, and automated insulin delivery systems), large volumes of patient data are dispatched to central cloud servers for disease ...
Weizheng Wang +6 more
semanticscholar +1 more source
IEEE Sensors Journal, 2021
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the ...
Sensen Li +3 more
semanticscholar +1 more source
Device authentication and key exchange are essential issues for Internet of Things (IoT) which plays an indispensable role in modern life. Many sensor devices in IoT, with limited resources and poor self-protection capabilities, are deployed in the ...
Sensen Li +3 more
semanticscholar +1 more source
In-Memory Unified TRNG and Multi-Bit PUF for Ubiquitous Hardware Security
IEEE Journal of Solid-State Circuits, 2022This work describes an SRAM architecture with in-memory generation of both dynamic and multi-bit static entropy. This inexpensively extends complete key generation capabilities to any system that includes an SRAM, and hence ubiquitously down to tightly ...
Sachin Taneja +2 more
semanticscholar +1 more source
PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
IEEE Transactions on Dependable and Secure Computing, 2021Physically unclonable functions (PUFs) bind a device's identity to its physical hardware and thus, can be employed for device identification, authentication and cryptographic key generation.
Mahmood Azhar Qureshi, Arslan Munir
semanticscholar +1 more source
FLAM-PUF: A Response–Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022Physical unclonable functions (PUFs) have been adopted in many resource-constrained Internet of Things (IoT) applications to provide effective and lightweight solutions for device authentication. However, an attacker can collect challenge–response pairs (
Linjun Wu +5 more
semanticscholar +1 more source
A Lightweight FPGA Compatible Weak-PUF Primitive Based on XOR Gates
IEEE Transactions on Circuits and Systems - II - Express Briefs, 2022In this brief we introduce a novel lightweight FPGA compatible Physical Unclonable Function (PUF) primitive based on XOR gates. The proposed XOR-PUF is the most compact FPGA-compatible PUF ever presented in the literature, allowing the implementation of ...
Riccardo Della Sala +2 more
semanticscholar +1 more source
A Unified PUF and TRNG Design Based on 40-nm RRAM With High Entropy and Robustness for IoT Security
IEEE Transactions on Electron Devices, 2022Physically unclonable function (PUF) and true random number generator (TRNG) are the indispensable primitives for the Internet-of-Things (IoT) security. In this article, a highly robust unified PUF $/$ TRNG design is demonstrated.
B. Gao +5 more
semanticscholar +1 more source
IEEE Transactions on Network Science and Engineering, 2022
Dynamic charging is a potential technology that would enable electric vehicles to be charged while they are in motion. Significant security and privacy concerns, on the other hand, arise as a result of communications between electric vehicles and a ...
Raveendra Babu Ponnuru +3 more
semanticscholar +1 more source
Dynamic charging is a potential technology that would enable electric vehicles to be charged while they are in motion. Significant security and privacy concerns, on the other hand, arise as a result of communications between electric vehicles and a ...
Raveendra Babu Ponnuru +3 more
semanticscholar +1 more source
CT PUF: Configurable Tristate PUF Against Machine Learning Attacks for IoT Security
IEEE Internet of Things Journal, 2021Physical unclonable function (PUF) is a promising lightweight hardware security primitive for resource-limited Internet-of-Things (IoT) devices. Strong PUFs are suitable for lightweight device authentication because it can generate quantities of ...
Jiliang Zhang +4 more
semanticscholar +1 more source
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning
ACM Trans. Internet Techn., 2021The Industrial Internet of Things (IIoT) is designed to refine and optimize the process controls, thereby leveraging improvements in economic benefits, such as efficiency and productivity.
W. Liang +4 more
semanticscholar +1 more source

