{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:18:02Z","timestamp":1726064282171},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_18","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"461-473","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions"],"prefix":"10.1007","author":[{"given":"Mohammed Saeed","family":"Alkatheiri","sequence":"first","affiliation":[]},{"given":"Abdur Rashid","family":"Sangi","sequence":"additional","affiliation":[]},{"given":"Satish","family":"Anamalamudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"18_CR1","unstructured":"Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., & Struik, R. (2013, September). Security considerations in the IP-based internet of things. Draft-garcia-core-security-06 (work in progress)."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., & Richardson, M. (2014, October). A security threat analysis for routing protocol for low-power and lossy networks (RPL). Draft-ietf-roll-security-threats-11 (work in progress).","DOI":"10.17487\/rfc7416"},{"key":"18_CR3","unstructured":"Sarikaya, B., Sethi, M., & Garcia-Carillo, D. (2018, September). Secure IoT bootstrapping: A survey. Draft-sarikaya-t2trg-sbootstrapping-05 (work in progress)."},{"issue":"11","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","volume":"8","author":"U Ruhrmair","year":"2013","unstructured":"Ruhrmair, U., Solter, J., Sehnke, F., Xu, X., Mahmoud, A., et al. (2013). PUF modelling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security, 8(11), 1876\u20131891.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"18_CR5","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta, B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global."},{"key":"18_CR6","unstructured":"Edward Suh, G., & Devadas, S. (2007). Physical Unclonable Functions for device authentication and secret key generation. In Proceedings of the 44th annual design automation conference (pp. 644\u2013654). ACM."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Meng-Day Y., M\u2019Raihi, D., Sowell, R., & Devadas, S. (2011, October). Lightweight and secure PUF key storage using limits of machine learning. In Cryptographic Hardware and Embedded Systems, CHES 2011\u201413th International Workshop, Nara, Japan (pp. 358\u2013373).","DOI":"10.1007\/978-3-642-23951-9_24"},{"key":"18_CR8","first-page":"666","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","author":"B Gupta","year":"2018","unstructured":"Gupta, B., Agrawal, D. P., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"M Shamim Hossain","year":"2018","unstructured":"Shamim Hossain, M., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596\u2013606.","journal-title":"Future Generation Computer Systems"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP., & Alexander, R. (2012, March). RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550. \nhttps:\/\/doi.org\/10.17487\/RFC6550\n\n. Retrieved from \nhttps:\/\/www.rfc-editor.org\/info\/rfc6550","DOI":"10.17487\/RFC6550"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Bradner, S. (1997, March). Key words for use in RFCs to indicate requirement levels. BCP 14, RFC 2119. \nhttps:\/\/doi.org\/10.17487\/RFC2119\n\n. Retrieved from \nhttps:\/\/www.rfc-editor.org\/info\/rfc2119","DOI":"10.17487\/RFC2119"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, B. B., & Quamara, M. An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, e4946.","DOI":"10.1002\/cpe.4946"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-642-28368-0_22","volume":"6805","author":"U Ruhrmair","year":"2012","unstructured":"Ruhrmair, U. (2012). SIMPL systems as a key less cryptographic and security primitive. Lecture Notes in Computer Science, 6805, 329\u2013354.","journal-title":"Lecture Notes in Computer Science"},{"key":"18_CR14","unstructured":"Labrado, C., & Thapliyal, H. (2018). Design of a piezoelectric based physically unclonable function for IoT security. IEEE Internet of Things Journal, 6(2) 2770\u20132777."},{"issue":"1","key":"18_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/J.ENG.2016.01.014","volume":"2","author":"M O\u2019Neill","year":"2016","unstructured":"O\u2019Neill, M. (2016). Insecurity by design: Today\u2019s IoT device security problem. Engineering, 2(1), 48\u201349.","journal-title":"Engineering"},{"key":"18_CR16","unstructured":"Kim, S. W. (2014). Physical integrity check in wireless relay networks. In: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA (pp. 514\u2013515)."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Kasmi, O., Baina, A., & Bellafkih, M. (2016) Multi level integrity management in critical infrastructure. In 2016 11th International Conference on Intelligent Systems: Theories and Applications (SITA), Mohammedia, Morocco (pp. 1\u20136).","DOI":"10.1109\/SITA.2016.7772292"},{"issue":"1","key":"18_CR18","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TPDS.2016.2546259","volume":"28","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Yang, X., Lin, J., Xu, G., & Yu, W. (2017, January). On data integrity attacks against real-time pricing in energy-based cyber-physical systems. IEEE Transactions on Parallel and Distributed Systems, 28(1), 170\u2013187.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:05:02Z","timestamp":1577775902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_18","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}