{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T23:37:57Z","timestamp":1776641877883,"version":"3.51.2"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032161642","type":"print"},{"value":"9783032161659","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16165-9_25","type":"book-chapter","created":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T22:44:38Z","timestamp":1776638678000},"page":"407-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Inter-Device PUFs: A Novel Paradigm for\u00a0Physical Unclonable Functions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9847-7656","authenticated-orcid":false,"given":"Emiliia","family":"Geloczi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3608-874X","authenticated-orcid":false,"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Al-Meer, A., Al-Kuwari, S.: Physical unclonable functions (PUF) for IoT devices. ACM Comput. Surv. 55(14s) (2023). https:\/\/doi.org\/10.1145\/3591464","DOI":"10.1145\/3591464"},{"key":"25_CR2","doi-asserted-by":"publisher","unstructured":"Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180\u2013187 (2015). https:\/\/doi.org\/10.1109\/ISCC.2015.7405513","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"25_CR3","unstructured":"Arduino: Nano 33 BLE Rev2 Documentation. Arduino Documentation. https:\/\/docs.arduino.cc\/hardware\/nano-33-ble-rev2\/"},{"key":"25_CR4","volume-title":"Mathematical Methods for Physicists","author":"GB Arfken","year":"1972","unstructured":"Arfken, G.B., Weber, H.J.: Mathematical Methods for Physicists. Academic Press, Orlando (1972)"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.future.2019.06.012","volume":"101","author":"M Barbareschi","year":"2019","unstructured":"Barbareschi, M., De Benedictis, A., La Montagna, E., Mazzeo, A., Mazzocca, N.: A PUF-based mutual authentication scheme for cloud-Edges IoT systems. Futur. Gener. Comput. Syst. 101, 246\u2013261 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.06.012","journal-title":"Futur. Gener. Comput. Syst."},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jpdc.2018.04.007","volume":"119","author":"M Barbareschi","year":"2018","unstructured":"Barbareschi, M., De Benedictis, A., Mazzocca, N.: A PUF-based hardware mutual authentication protocol. J. Parallel and Distrib. Comput. 119, 107\u2013120 (2018). https:\/\/doi.org\/10.1016\/j.jpdc.2018.04.007","journal-title":"J. Parallel and Distrib. Comput."},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Barker, E.B., Roginsky, A.L.: Transitioning the Use of Cryptographic Algorithms and Key Lengths. Technical report NIST SP 800-131A Rev. 3, National Institute of Standards and Technology (NIST), Gaithersburg, MD (2024). https:\/\/doi.org\/10.6028\/NIST.SP.800-131Ar3.ipd","DOI":"10.6028\/NIST.SP.800-131Ar3.ipd"},{"key":"25_CR8","doi-asserted-by":"publisher","unstructured":"B\u00f6hm, C., Hofer, M., Pribyl, W.: A microcontroller SRAM-PUF. In: 2011 5th International Conference on Network and System Security, pp. 269\u2013273 (2011). https:\/\/doi.org\/10.1109\/ICNSS.2011.6060013","DOI":"10.1109\/ICNSS.2011.6060013"},{"key":"25_CR9","unstructured":"Borovkov, A.: Probability Theory. Taylor & Francis (1999)"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"3847","DOI":"10.1109\/TIFS.2022.3214089","volume":"17","author":"D Chatterjee","year":"2022","unstructured":"Chatterjee, D., Boyapally, H., Patranabis, S., Chatterjee, U., Hazra, A., Mukhopadhyay, D.: Physically related functions: exploiting related inputs of PUFs for authenticated-key exchange. IEEE Trans. Inf. Forensics Secur. 17, 3847\u20133862 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3214089","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"25_CR11","unstructured":"CVE Details: Number of common IT security vulnerabilities and exposures (CVEs) worldwide from 2009 to 2024 YTD. Graph (2024). https:\/\/www.statista.com\/statistics\/500755\/worldwide-common-vulnerabilities-and-exposures\/"},{"issue":"2","key":"25_CR12","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983). https:\/\/doi.org\/10.1109\/TIT.1983.1056650","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/9781108591034","volume-title":"Probability: Theory and Examples","author":"R Durrett","year":"2019","unstructured":"Durrett, R.: Probability: Theory and Examples, vol. 49. Cambridge University Press, Cambridge (2019)"},{"key":"25_CR14","unstructured":"Espressif Systems: ESP32-S3-DevKitC-1 Documentation. Espressif Documentation. https:\/\/docs.espressif.com\/projects\/esp-dev-kits\/en\/latest\/esp32s3\/esp32-s3-devkitc-1\/index.html"},{"key":"25_CR15","unstructured":"Espressif Systems: ESP8266-DevKitC Getting Started Guide. PDF Documentation. https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/ESP8266-DevKitC_getting_started_guide__EN.pdf"},{"key":"25_CR16","unstructured":"Federal Office for Information Security (BSI): BSI Technical Guideline TR-02102-1: Cryptographic Mechanisms and Key Lengths. Technical Guideline (2025). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/TechGuidelines\/TG02102\/BSI-TR-02102-1.pdf?__blob=publicationFile&v=10"},{"key":"25_CR17","doi-asserted-by":"publisher","unstructured":"Garg, S., Kaur, K., Kaddoum, G., Choo, K.K.R.: Toward secure and provable authentication for internet of things: realizing Industry 4.0. IEEE Internet Things J. 7(5), 4598\u20134606 (2020). https:\/\/doi.org\/10.1109\/JIOT.2019.2942271","DOI":"10.1109\/JIOT.2019.2942271"},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Grubel, B.C., et al.: Silicon photonic physical unclonable function. Opt. Express 25(11), 12710\u201312721 (2017). https:\/\/doi.org\/10.1364\/OE.25.012710","DOI":"10.1364\/OE.25.012710"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"key":"25_CR20","doi-asserted-by":"publisher","unstructured":"Idriss, T., Bayoumi, M.: Lightweight highly secure PUF protocol for mutual authentication and secret message exchange. In: 2017 IEEE International Conference on RFID Technology & Application (RFID-TA), pp. 214\u2013219 (2017). https:\/\/doi.org\/10.1109\/RFID-TA.2017.8098893","DOI":"10.1109\/RFID-TA.2017.8098893"},{"issue":"12","key":"25_CR21","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/s11623-012-0295-z","volume":"36","author":"S Katzenbeisser","year":"2012","unstructured":"Katzenbeisser, S., Schaller, A.: Physical unclonable functions: Sicherheitseigenschaften und Anwendungen. Datenschutz und Datensicherheit - DuD 36(12), 881\u2013885 (2012). https:\/\/doi.org\/10.1007\/s11623-012-0295-z","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"25_CR22","doi-asserted-by":"publisher","unstructured":"Khatua, M., Das, S., Rana, P.M.: PUF-based lightweight mutual authentication scheme for IoT-based smart grids. In: 2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/ANTS63515.2024.10898763","DOI":"10.1109\/ANTS63515.2024.10898763"},{"key":"25_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103414","volume":"204","author":"A Kumar","year":"2022","unstructured":"Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W.J., Kim, T.H.: A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204, 103414 (2022). https:\/\/doi.org\/10.1016\/j.jnca.2022.103414","journal-title":"J. Netw. Comput. Appl."},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Kumar, R., Burleson, W.: On design of a highly secure PUF based on non-linear current mirrors. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 38\u201343 (2014). https:\/\/doi.org\/10.1109\/HST.2014.6855565","DOI":"10.1109\/HST.2014.6855565"},{"issue":"5","key":"25_CR25","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2683200","journal-title":"IEEE Internet Things J."},{"key":"25_CR26","doi-asserted-by":"publisher","unstructured":"Mahalat, M.H., Karmakar, D., Mondal, A., Sen, B.: PUF-based secure and lightweight authentication and key-sharing scheme for wireless sensor network. J. Emerg. Technol. Comput. Syst. 18(1) (2021). https:\/\/doi.org\/10.1145\/3466682","DOI":"10.1145\/3466682"},{"key":"25_CR27","doi-asserted-by":"publisher","unstructured":"Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D.S., Devadas, S.: Slender PUF protocol: a lightweight, robust, and secure authentication by substring matching. In: 2012 IEEE Symposium on Security and Privacy Workshops, pp. 33\u201344 (2012). https:\/\/doi.org\/10.1109\/SPW.2012.30","DOI":"10.1109\/SPW.2012.30"},{"issue":"11","key":"25_CR28","doi-asserted-by":"publisher","first-page":"8205","DOI":"10.1109\/JIOT.2022.3142084","volume":"9","author":"P Mall","year":"2022","unstructured":"Mall, P., Amin, R., Das, A.K., Leung, M.T., Choo, K.K.R.: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: a comprehensive survey. IEEE Internet Things J. 9(11), 8205\u20138228 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3142084","journal-title":"IEEE Internet Things J."},{"key":"25_CR29","unstructured":"Microchip Technology Inc.: 23A512 - 512 Kbit SPI Serial SRAM (2025). https:\/\/www.microchip.com\/en-us\/product\/23a512"},{"issue":"7","key":"25_CR30","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012). https:\/\/doi.org\/10.1016\/j.adhoc.2012.02.016","journal-title":"Ad Hoc Netw."},{"key":"25_CR31","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"MB Mohamad Noor","year":"2019","unstructured":"Mohamad Noor, M.B., Hassan, W.H.: Current research on internet of things (IoT) security: a survey. Comput. Netw. 148, 283\u2013294 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2018.11.025","journal-title":"Comput. Netw."},{"key":"25_CR32","unstructured":"National Institute of Standards and Technology (NIST): NIST Special Publication 800-78-5: Cryptographic Algorithms and Key Sizes for PIV. NIST Special Publication (2025). https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-78-5.pdf"},{"key":"25_CR33","doi-asserted-by":"publisher","unstructured":"Paral, Z., Devadas, S.: Reliable and efficient PUF-based key generation using pattern matching. In: 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 128\u2013133 (2011). https:\/\/doi.org\/10.1109\/HST.2011.5955010","DOI":"10.1109\/HST.2011.5955010"},{"key":"25_CR34","doi-asserted-by":"publisher","unstructured":"Pham, H.L., Tran-Thi, T.Q., Bui, D.H., Tran, X.T.: Novel PUF-based authentication protocol for IoT devices with secure boot and fuzzy matching. In: 2023 International Conference on Advanced Technologies for Communications (ATC), pp. 78\u201383 (2023). https:\/\/doi.org\/10.1109\/ATC58710.2023.10318908","DOI":"10.1109\/ATC58710.2023.10318908"},{"key":"25_CR35","doi-asserted-by":"publisher","unstructured":"Raj, K., Bodapati, S., Chattopadhyay, A.: PUF-based lightweight mutual authentication protocol for internet of things (IoT) devices. In: 2024 IEEE International Symposium on Circuits and Systems (ISCAS), pp.\u00a01\u20135 (2024). https:\/\/doi.org\/10.1109\/ISCAS58744.2024.10558672","DOI":"10.1109\/ISCAS58744.2024.10558672"},{"key":"25_CR36","unstructured":"Rosen, K.H., Krithivasan, K.: Discrete Mathematics and its Applications, vol.\u00a06. McGraw-Hill, New York (1999)"},{"key":"25_CR37","unstructured":"Ross, S.: A First Course in Probability, vol.\u00a02. Macmillan, New York (1976)"},{"key":"25_CR38","doi-asserted-by":"publisher","unstructured":"R\u00fchrmair, U., Busch, H., Katzenbeisser, S.: Strong PUFs: Models, Constructions, and Security Proofs, pp. 79\u201396. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3_4","DOI":"10.1007\/978-3-642-14452-3_4"},{"key":"25_CR39","unstructured":"Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10(3) (2014)"},{"key":"25_CR40","unstructured":"Statista: Internet of Things - Market Outlook Report. Statista. https:\/\/de.statista.com\/statistik\/studie\/id\/109209\/dokument\/internet-der-dinge-market-outlook-report\/"},{"issue":"2","key":"25_CR41","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TETC.2021.3072421","volume":"10","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Wang, C., Gu, C., Cui, Y., O\u2019Neill, M., Liu, W.: A dynamically configurable PUF and dynamic matching authentication protocol. IEEE Trans. Emerg. Top. Comput. 10(2), 1091\u20131104 (2022). https:\/\/doi.org\/10.1109\/TETC.2021.3072421","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"25_CR42","doi-asserted-by":"publisher","unstructured":"Xu, T., Gu, H., Potkonjak, M.: An ultra-low energy PUF matching security platform using programmable delay lines. In: 2016 11th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC), pp.\u00a01\u20138 (2016). https:\/\/doi.org\/10.1109\/ReCoSoC.2016.7533899","DOI":"10.1109\/ReCoSoC.2016.7533899"},{"issue":"20","key":"25_CR43","doi-asserted-by":"publisher","first-page":"18082","DOI":"10.1109\/JIOT.2023.3279847","volume":"10","author":"S Yoon","year":"2023","unstructured":"Yoon, S., Han, S., Hwang, E.: Joint heterogeneous PUF-based security-enhanced IoT authentication. IEEE Internet Things J. 10(20), 18082\u201318096 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3279847","journal-title":"IEEE Internet Things J."},{"key":"25_CR44","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Ge, Y.: Evaluation of microcontroller-based SRAM PUF and the authentication scheme. In: Proceedings of the 4th International Conference on Computer, Internet of Things and Control Engineering. CITCE 2024, pp. 79\u201386. Association for Computing Machinery, New York (2025). https:\/\/doi.org\/10.1145\/3705677.3705691","DOI":"10.1145\/3705677.3705691"},{"key":"25_CR45","doi-asserted-by":"publisher","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 230\u2013234 (2014). https:\/\/doi.org\/10.1109\/SOCA.2014.58","DOI":"10.1109\/SOCA.2014.58"},{"key":"25_CR46","doi-asserted-by":"publisher","unstructured":"Zhu, Y., Guan, Z., Wang, Z., Li, D., Wang, Y., Xu, M.: SRAM-PUF based lightweight mutual authentication scheme for IoT. In: 2021 IEEE Internationall Conference on Parallel ISPA\/BDCloud\/SocialCom\/SustainCom, pp. 806\u2013813 (2021). https:\/\/doi.org\/10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00115","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00115"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2025 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16165-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T22:44:40Z","timestamp":1776638680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16165-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032161642","9783032161659"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16165-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}