Physical Unclonable Functions (PUF) for IoT Devices

05/17/2022
by   Abdulaziz Al-Meer, et al.
0

Physical Unclonable Function (PUF) has recently attracted interested from both industry and academia as a potential alternative approach to secure Internet of Things (IoT) devices from the more traditional computational based approach using conventional cryptography. PUF is promising solution for lightweight security, where the manufacturing fluctuation process of IC is used to improve the security of IoT as it provides low complexity design and preserves secrecy. It provides less cost of computational resources which prevent high power consumption and can be implemented in both Field Programmable Gate Arrays (FPGA) and Application-Specific Integrated Circuits (ASICs). In this survey we provide a comprehensive review of the state-of-the-art of PUF, its architectures, protocols and security for IoT.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/24/2021

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Security is of critical importance for the Internet of Things (IoT). Man...
research
06/15/2021

Low-Energy and CPA-Resistant Adiabatic CMOS/MTJ Logic for IoT Devices

The tremendous growth in the number of Internet of Things (IoT) devices ...
research
06/21/2021

An Efficient SDN Architecture for Smart Home Security Accelerated by FPGA

With the rise in Internet of Things (IoT) devices, home network manageme...
research
02/16/2020

Enabling Low-Power OFDM for IoT by Exploiting Asymmetric Clock Rates

The conventional high-speed Wi-Fi has recently become a contender for lo...
research
01/08/2021

Physical Layer Security based Key Management for LoRaWAN

Within this the work applicability of Physical LayerSecurity (PHYSEC) ba...
research
01/15/2023

Secure Video Streaming Using Dedicated Hardware

Purpose: The purpose of this article is to present a system that enhance...
research
06/01/2021

Green IoT System Architecture for Applied Autonomous Network Cybersecurity Monitoring

Network security morning (NSM) is essential for any cybersecurity system...

Please sign up or login with your details

Forgot password? Click here to reset