{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:54Z","timestamp":1765622514069,"version":"3.48.0"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02156-9","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:13:46Z","timestamp":1761628426000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A survey on lightweight hardware security using physically unclonable functions for IoT devices"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9315-9226","authenticated-orcid":false,"given":"Giriraj","family":"Sharma","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,28]]},"reference":[{"issue":"9","key":"2156_CR1","doi-asserted-by":"publisher","first-page":"491","DOI":"10.3390\/info14090491","volume":"14","author":"G Sharma","year":"2023","unstructured":"Sharma G, Joshi AM, Mohanty SP (2023) Fortified-Grid: Fortifying smart grids through the integration of the trusted platform module in internet of things devices. Information 14(9):491","journal-title":"Information"},{"key":"2156_CR2","doi-asserted-by":"crossref","unstructured":"Strieder E, Baehr J, Hiller M (2024) AI-enabled hardware security. In: AI-enabled electronic circuit and system design: from ideation to utilization. Springer, pp 309\u2013342","DOI":"10.1007\/978-3-031-71436-8_9"},{"key":"2156_CR3","doi-asserted-by":"publisher","first-page":"33979","DOI":"10.1109\/ACCESS.2023.3264016","volume":"11","author":"S Hemavathy","year":"2023","unstructured":"Hemavathy S, Bhaaskaran VK (2023) Arbiter PUF\u2013a review of design, composition, and security aspects. IEEE Access 11:33979\u201334004","journal-title":"IEEE Access"},{"issue":"4","key":"2156_CR4","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s13389-021-00283-6","volume":"12","author":"U R\u00fchrmair","year":"2022","unstructured":"R\u00fchrmair U (2022) Secret-free security: a survey and tutorial. J Cryptogr Eng 12(4):387\u2013412","journal-title":"J Cryptogr Eng"},{"key":"2156_CR5","doi-asserted-by":"crossref","unstructured":"McGrath T, Bagci IE, Wang ZM, Roedig U, Young RJ (2019) A PUF taxonomy. Appl Phys Rev 6(1)","DOI":"10.1063\/1.5079407"},{"key":"2156_CR6","doi-asserted-by":"crossref","unstructured":"Chowdhury S, Covic A, Acharya RY, Dupee S, Ganji F, Forte D (2021) Physical security in the post-quantum era: a survey on side-channel analysis, random number generators, and physically unclonable functions. Journal of Cryptographic Engineering 1\u201337","DOI":"10.1007\/s13389-021-00255-w"},{"key":"2156_CR7","doi-asserted-by":"crossref","unstructured":"Ehret A, Gettings K, Jordan BR, Kinsy MA (2019) A survey on hardware security techniques targeting low-power SoC designs. In: 2019 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, pp 1\u20138","DOI":"10.1109\/HPEC.2019.8916486"},{"issue":"2","key":"2156_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2818186","volume":"48","author":"J Delvaux","year":"2015","unstructured":"Delvaux J, Peeters R, Gu D, Verbauwhede I (2015) A survey on lightweight entity authentication with strong PUFs. ACM Comput Surv (CSUR) 48(2):1\u201342","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"14","key":"2156_CR9","doi-asserted-by":"publisher","first-page":"3208","DOI":"10.3390\/s19143208","volume":"19","author":"A Babaei","year":"2019","unstructured":"Babaei A, Schiele G (2019) Physical unclonable functions in the internet of things: state of the art and open challenges. Sensors 19(14):3208","journal-title":"Sensors"},{"issue":"1","key":"2156_CR10","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/JPROC.2017.2780172","volume":"106","author":"A Burg","year":"2017","unstructured":"Burg A, Chattopadhyay A, Lam K-Y (2017) Wireless communication and security issues for cyber-physical systems and the internet-of-things. Proc IEEE 106(1):38\u201360","journal-title":"Proc IEEE"},{"issue":"1","key":"2156_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/JPROC.2017.2781198","volume":"106","author":"M Wolf","year":"2017","unstructured":"Wolf M, Serpanos D (2017) Safety and security in cyber-physical systems and internet-of-things systems. Proc IEEE 106(1):9\u201320","journal-title":"Proc IEEE"},{"issue":"5","key":"2156_CR12","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125\u20131142","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"2156_CR13","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/JIOT.2018.2873343","volume":"6","author":"S Arshad","year":"2018","unstructured":"Arshad S, Azam MA, Rehmani MH, Loo J (2018) Recent advances in information-centric networking-based internet of things (ICN-IoT). IEEE Internet Things J 6(2):2128\u20132158","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2156_CR14","first-page":"1247","volume":"33","author":"S G\u00f6rm\u00fc\u015f","year":"2018","unstructured":"G\u00f6rm\u00fc\u015f S, Ayd\u0131n H, Uluta\u015f G (2018) Security for the internet of things: a survey of existing mechanisms, protocols and open research issues. J Fac Eng Archit Gazi Univ 33(4):1247\u20131272","journal-title":"J Fac Eng Archit Gazi Univ"},{"issue":"4","key":"2156_CR15","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/SURV.2011.072210.00075","volume":"13","author":"H Chen","year":"2010","unstructured":"Chen H, Chen Y, Summerville DH (2010) A survey on the application of FPGAs for network infrastructure security. IEEE Commun Surv Tutorials 13(4):541\u2013561","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2156_CR16","unstructured":"Sfyrakis I, Gross T (2020) A survey on hardware approaches for remote attestation in network infrastructures. arXiv:2005.12453"},{"key":"2156_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.procs.2022.12.401","volume":"218","author":"K Dhanya","year":"2023","unstructured":"Dhanya K, Vajipayajula S, Srinivasan K, Tibrewal A, Kumar TS, Kumar TG (2023) Detection of network attacks using machine learning and deep learning models. Procedia Comput Sci 218:57\u201366","journal-title":"Procedia Comput Sci"},{"key":"2156_CR18","doi-asserted-by":"crossref","unstructured":"Liang G, Chang S, Dai M, Zhu H (2024) FLoomChecker: repelling free-riders in federated learning via training integrity verification. In: 2024 IEEE 30th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, pp 194\u2013201","DOI":"10.1109\/ICPADS63350.2024.00034"},{"key":"2156_CR19","first-page":"160","volume":"4","author":"P Tuyls","year":"2022","unstructured":"Tuyls P et al (2022) Quantum PUFs: on the feasibility of quantum unclonable functions. Nat Rev Phys 4:160\u2013171","journal-title":"Nat Rev Phys"},{"key":"2156_CR20","doi-asserted-by":"crossref","unstructured":"Sharma G, Joshi AM, Mohanty SP (2024) sTrade 2.0: efficient mutual authentication scheme for energy trading in V2G using physically unclonable function. IEEE Journal of Emerging and Selected Topics in Industrial Electronics","DOI":"10.1109\/JESTIE.2024.3384921"},{"key":"2156_CR21","doi-asserted-by":"crossref","unstructured":"Chandran I, Vipin K (2025) A cross-layer PUF-secured energy and congestion-aware on-demand routing for multi-UAV networks. Computer Networks 111076","DOI":"10.1016\/j.comnet.2025.111076"},{"issue":"1","key":"2156_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-024-00308-7","volume":"8","author":"H Wang","year":"2025","unstructured":"Wang H, Hao W, Tang Y, Zhu B, Dong W, Liu W (2025) Deep neural network modeling attacks on arbiter-PUF-based designs. Cybersecurity 8(1):1\u201316","journal-title":"Cybersecurity"},{"key":"2156_CR23","doi-asserted-by":"crossref","unstructured":"Zhou Z, Li G, Zhang Y, Zheng Z, Yuan T, Wang P (2025) A strong PUF based security protocol to protect ai model parameters against privacy information leakage. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2025.3544555"},{"key":"2156_CR24","doi-asserted-by":"crossref","unstructured":"Botta A, De\u00a0Donato W, Persico V (2014) Pescap\u2019e, a: On the integration of cloud computing and internet of things. In: 2014 international conference on Future internet of things and cloud (FiCloud). pp 23\u201330","DOI":"10.1109\/FiCloud.2014.14"},{"issue":"9","key":"2156_CR25","doi-asserted-by":"publisher","first-page":"e3195","DOI":"10.1002\/com.3195","volume":"30","author":"M Delavar","year":"2017","unstructured":"Delavar M, Mirzakuchaki S, Ameri M, Mohajeri J (2017) PUF-based solutions for secure communications in advanced metering infrastructure (AMI). Int J Commun Syst 30(9):e3195. https:\/\/doi.org\/10.1002\/com.3195","journal-title":"Int J Commun Syst"},{"key":"2156_CR26","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.procs.2015.05.013","volume":"52","author":"SR Moosavi","year":"2015","unstructured":"Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452\u2013459","journal-title":"Procedia Comput Sci"},{"key":"2156_CR27","doi-asserted-by":"crossref","unstructured":"Rahimi H, Zibaeenejad A, Rajabzadeh P, Safavi AA (2018) On the security of the 5G-IoT architecture. In: Proceedings of the international conference on smart cities and Internet of Things. pp 1\u20138","DOI":"10.1145\/3269961.3269968"},{"issue":"9","key":"2156_CR28","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1002\/dac.2373","volume":"25","author":"H Ning","year":"2012","unstructured":"Ning H, Hu S (2012) Technology classification, industry, and education for Future Internet of Things. Int J Commun Syst 25(9):1230\u20131241","journal-title":"Int J Commun Syst"},{"key":"2156_CR29","doi-asserted-by":"crossref","unstructured":"Yang X, Li Z, Geng Z, Zhang H (2012) A multi-layer security model for Internet of Things. In: Internet of Things. Springer, pp 388\u2013393","DOI":"10.1007\/978-3-642-32427-7_54"},{"key":"2156_CR30","unstructured":"Song Y (2013) Security in Internet of Things"},{"key":"2156_CR31","doi-asserted-by":"crossref","unstructured":"Leach P, Mealling M, Salz R (2005) A universally unique identifier (UUID) URN namespace. Tech. rep, Network Working Group","DOI":"10.17487\/rfc4122"},{"key":"2156_CR32","doi-asserted-by":"crossref","unstructured":"Song Z, C\u00e1rdenas AA, Masuoka R (2010) Semantic middleware for the Internet of Things. in: Internet of Things (IOT), 2010. IEEE, pp 1\u20138","DOI":"10.1109\/IOT.2010.5678448"},{"key":"2156_CR33","doi-asserted-by":"crossref","unstructured":"Shelby Z, Hartke K, Bormann C (2014) The constrained application protocol (CoAP). Tech. rep, IETF","DOI":"10.17487\/rfc7252"},{"key":"2156_CR34","doi-asserted-by":"crossref","unstructured":"Hunkeler U, Truong HL, Stanford-Clark A (2008) MQTT-S\u2014a publish\/subscribe protocol for wireless sensor networks. In: 3rd international conference on communication systems software and middleware and workshops, 2008. Comsware 2008. IEEE, pp 791\u2013798","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"2156_CR35","doi-asserted-by":"crossref","unstructured":"Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on Frontiers of Information Technology (FIT). IEEE, pp 257\u2013260","DOI":"10.1109\/FIT.2012.53"},{"issue":"8","key":"2156_CR36","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/JPROC.2014.2335155","volume":"102","author":"M Rostami","year":"2014","unstructured":"Rostami M, Koushanfar F, Karri R (2014) A primer on hardware security: models, methods, and metrics. Proc IEEE 102(8):1283\u20131295","journal-title":"Proc IEEE"},{"key":"2156_CR37","doi-asserted-by":"crossref","unstructured":"Rostami M, Koushanfar F, Rajendran J, Karri R (2013) Hardware security: threat models and metrics. In: 2013 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, pp 819\u2013823","DOI":"10.1109\/ICCAD.2013.6691207"},{"key":"2156_CR38","doi-asserted-by":"crossref","unstructured":"Koushanfar F, Fazzari S, McCants C, Bryson W, Sale M, Song P, Potkonjak M (2012) Can EDA combat the rise of electronic counterfeiting? In: Proceedings of the 49th annual design automation conference. pp 133\u2013138","DOI":"10.1145\/2228360.2228386"},{"key":"2156_CR39","doi-asserted-by":"crossref","unstructured":"Rohatgi P (2009) Improved techniques for side-channel analysis. Cryptographic Engineering, 381\u2013406","DOI":"10.1007\/978-0-387-71817-0_14"},{"key":"2156_CR40","doi-asserted-by":"crossref","unstructured":"ChristofPaar JP, Preneel B (2010) Understanding cryptography: a textbook for students and ractitioners. Springer","DOI":"10.1007\/978-3-642-04101-3"},{"issue":"15","key":"2156_CR41","first-page":"15","volume":"13","author":"P Mahajan","year":"2013","unstructured":"Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Global J Comp Sci Technol 13(15):15\u201322","journal-title":"Global J Comp Sci Technol"},{"key":"2156_CR42","doi-asserted-by":"crossref","unstructured":"Rohatgi P (2009) Electromagnetic attacks and countermeasures. Cryptographic Engineering, 407\u2013430","DOI":"10.1007\/978-0-387-71817-0_15"},{"key":"2156_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13389-013-0053-7","volume":"3","author":"A Schl\u00f6sser","year":"2013","unstructured":"Schl\u00f6sser A, Nedospasov D, Kr\u00e4mer J, Orlic S, Seifert J-P (2013) Simple photonic emission analysis of AES. J Cryptogr Eng 3:3\u201315","journal-title":"J Cryptogr Eng"},{"key":"2156_CR44","doi-asserted-by":"crossref","unstructured":"Beckmann N, Potkonjak M (2009) Hardware-based public-key cryptography with public physically unclonable functions. In: Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers 11. Springer, pp 206\u2013220","DOI":"10.1007\/978-3-642-04431-1_15"},{"key":"2156_CR45","doi-asserted-by":"crossref","unstructured":"Torrance R, James D (2011) The state-of-the-art in semiconductor reverse engineering. In: Proceedings of the 48th design automation conference. pp 333\u2013338","DOI":"10.1145\/2024724.2024805"},{"key":"2156_CR46","unstructured":"Saeed SM, Cui X, Wille R, Zulehner A, Wu K, Drechsler R, Karri R (2017) Towards reverse engineering reversible logic. arXiv:1704.08397"},{"key":"2156_CR47","doi-asserted-by":"crossref","unstructured":"Wendt JB, Potkonjak M (2014) Hardware obfuscation using PUF-based logic. In: 2014 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, pp 270\u2013271","DOI":"10.1109\/ICCAD.2014.7001362"},{"issue":"10","key":"2156_CR48","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MC.2010.299","volume":"43","author":"R Karri","year":"2010","unstructured":"Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware Trojans. Computer 43(10):39\u201346","journal-title":"Computer"},{"issue":"1","key":"2156_CR49","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MDT.2010.7","volume":"27","author":"M Tehranipoor","year":"2010","unstructured":"Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Des Test Comput 27(1):10\u201325","journal-title":"IEEE Des Test Comput"},{"key":"2156_CR50","doi-asserted-by":"crossref","unstructured":"Dupuis S, Ba P-S, Di Natale G, Flottes M-L, Rouzeyre B (2014) A novel hardware logic encryption technique for thwarting illegal overproduction and hardware Trojans. In: 2014 IEEE 20th International On-Line Testing Symposium (IOLTS). IEEE, pp 49\u201354","DOI":"10.1109\/IOLTS.2014.6873671"},{"issue":"8","key":"2156_CR51","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder C, Yu M-D, Koushanfar F, Devadas S (2014) Physical unclonable functions and applications: a tutorial. Proc IEEE 102(8):1126\u20131141","journal-title":"Proc IEEE"},{"issue":"1","key":"2156_CR52","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TIFS.2011.2165540","volume":"7","author":"A Maiti","year":"2012","unstructured":"Maiti A, Kim I, Schaumont P (2012) A robust physical unclonable function with enhanced challenge-response set. IEEE Trans Inf Forensics Secur 7(1):333\u2013345","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2156_CR53","doi-asserted-by":"crossref","unstructured":"Korenda A, Afghah F, Cambou B (2018) A secret key generation scheme for Internet of Things using ternary-states ReRAM-based physical unclonable functions. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, pp 1261\u20131266","DOI":"10.1109\/IWCMC.2018.8450341"},{"key":"2156_CR54","unstructured":"Cambou B, Afghah F (2016) Physically unclonable functions with multi-states and machine learning. In: 14th international workshop on cryptographic architectures embedded in logic devices (CryptArchi). p 1"},{"key":"2156_CR55","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U, Busch H, Katzenbeisser S (2010) Strong PUFs: models, constructions, and security proofs. Springer, pp 79\u201396","DOI":"10.1007\/978-3-642-14452-3_4"},{"issue":"5589","key":"2156_CR56","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu R, Recht B, Taylor J, Gershenfeld N (2002) Physical one-way functions. Science 297(5589):2026\u20132030","journal-title":"Science"},{"key":"2156_CR57","doi-asserted-by":"crossref","unstructured":"Tuyls P, Batina L (2006) RFID-tags for anti-counterfeiting. In: Cryptographers\u2019 track at the RSA conference. Springer, pp 115\u2013131","DOI":"10.1007\/11605805_8"},{"key":"2156_CR58","doi-asserted-by":"crossref","unstructured":"Tuyls P, Schrijen G-J, \u0160kori\u0107 B, Geloven JV, Verhaegh N, Wolters R (2006) Read-proof hardware from protective coatings. In: International workshop on cryptographic hardware and embedded systems, Lecture Notes in Computer Science. Springer, pp 369\u2013383","DOI":"10.1007\/11894063_29"},{"key":"2156_CR59","doi-asserted-by":"crossref","unstructured":"\u0160kori\u0107 B, Schrijen G-J, Ophey W, Wolters R, Verhaegh N, van Geloven J (2007) Experimental hardware for coating PUFs and optical PUFs. In: Security with noisy data, Lecture Notes in Computer Science. Springer, pp 255\u2013268","DOI":"10.1007\/978-1-84628-984-2_15"},{"key":"2156_CR60","first-page":"101","volume":"2006","author":"B \u0160kori\u0107","year":"2006","unstructured":"\u0160kori\u0107 B, Maubach S, Kevenaar T, Tuyls P (2006) Information-theoretic analysis of coating PUFs. IACR Cryptol ePrint Arch 2006:101","journal-title":"IACR Cryptol ePrint Arch"},{"key":"2156_CR61","doi-asserted-by":"crossref","unstructured":"Kursawe K, Sadeghi A-R, Schellekens D, \u0160kori\u0107 B, Tuyls P (2009) Reconfigurable physical unclonable functions-enabling technology for tamper-resistant storage. In: IEEE international workshop on hardware-oriented security and trust, 2009. HOST\u201909. IEEE, pp 22\u201329","DOI":"10.1109\/HST.2009.5225058"},{"key":"2156_CR62","unstructured":"R\u00fchrmair U, Hilgers C, Urban S, Weiersh\u00e4user A, Dinter E, Forster B, Jirauschek C (2013) Optical PUFs reloaded. Eprint. Iacr.Org"},{"key":"2156_CR63","doi-asserted-by":"crossref","unstructured":"Kumar S, Guajardo J, Maes R, Schrijen G-J, Tuyls P (2008) The butterfly PUF protecting IP on every FPGA. In: IEEE international workshop on hardware-oriented security and trust, 2008. HOST 2008. IEEE, pp 67\u201370","DOI":"10.1109\/HST.2008.4559053"},{"key":"2156_CR64","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U, Holcomb D (2014) PUFs at a glance. In: Proceedings of the conference on design, automation & test in Europe. European Design and Automation Association, p 347","DOI":"10.7873\/DATE2014.360"},{"key":"2156_CR65","doi-asserted-by":"crossref","unstructured":"Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) FPGA intrinsic PUFs and their use for IP protection. In: International workshop on cryptographic hardware and embedded systems, Lecture Notes in Computer Science. Springer, pp 63\u201380","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"2156_CR66","doi-asserted-by":"crossref","unstructured":"Guajardo J, Kumar S, Schrijen G-J, Tuyls P (2007) Physical unclonable functions and public-key crypto for FPGA IP protection. In: International conference on field programmable logic and applications, 2007. FPL 2007. IEEE, pp 189\u2013195","DOI":"10.1109\/FPL.2007.4380646"},{"key":"2156_CR67","doi-asserted-by":"crossref","unstructured":"Claes M, van\u00a0der Leest V, Braeken A (2011) Comparison of SRAM and FF PUF in 65 nm technology. In: Nordic conference on secure IT systems, Lecture Notes in Computer Science. Springer, pp 47\u201364","DOI":"10.1007\/978-3-642-29615-4_5"},{"key":"2156_CR68","doi-asserted-by":"crossref","unstructured":"Suh G, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual design automation conference. ACM, pp 9\u201314","DOI":"10.1109\/DAC.2007.375043"},{"key":"2156_CR69","doi-asserted-by":"crossref","unstructured":"Morozov S, Maiti A, Schaumont P (2010) An analysis of delay based PUF implementations on FPGA. In: International symposium on applied reconfigurable computing, Lecture Notes in Computer Science. Springer, pp 382\u2013387","DOI":"10.1007\/978-3-642-12133-3_37"},{"key":"2156_CR70","doi-asserted-by":"crossref","unstructured":"Fruhashi K, Shiozaki M, Fukushima A, Murayama T, Fujino T (2011) The arbiter-PUF with high uniqueness utilizing novel arbiter circuit with delay-time measurement. In: 2011 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, pp 2325\u20132328","DOI":"10.1109\/ISCAS.2011.5938068"},{"key":"2156_CR71","doi-asserted-by":"crossref","unstructured":"Maiti A, Schaumont P (2009) Improving the quality of a physical unclonable function using configurable ring oscillators. In: International conference on field programmable logic and applications, 2009. FPL 2009. IEEE, pp 703\u2013707","DOI":"10.1109\/FPL.2009.5272361"},{"key":"2156_CR72","unstructured":"Yin C-E, Qu G (2009) Temperature-aware cooperative ring oscillator PUF. In: IEEE international workshop on hardware-oriented security and trust, 2009. HOST\u201909. IEEE, pp 36\u201342"},{"issue":"1","key":"2156_CR73","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/jlpea7010002","volume":"7","author":"A Vijayakumar","year":"2017","unstructured":"Vijayakumar A, Patil V, Kundu S (2017) On improving reliability of SRAM-based physically unclonable functions. J Low Power Electron Appl 7(1):2","journal-title":"J Low Power Electron Appl"},{"key":"2156_CR74","doi-asserted-by":"crossref","unstructured":"B\u00f6hm C, Hofer M, Pribyl W (2011) A microcontroller SRAM-PUF. In: 5th International Conference on Network and System Security (NSS), 2011. IEEE, pp 269\u2013273","DOI":"10.1109\/ICNSS.2011.6060013"},{"key":"2156_CR75","unstructured":"Holcomb D, Burleson W, Fu K, et\u00a0al (2007) Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In: Proceedings of the conference on RFID security, vol 7. p 2"},{"key":"2156_CR76","doi-asserted-by":"crossref","unstructured":"Cambou B, Orlowski M (2016) PUF designed with resistive ram and ternary states. In: Proceedings of the 11th annual cyber and information security research conference. ACM, p 1","DOI":"10.1145\/2897795.2897808"},{"issue":"8","key":"2156_CR77","doi-asserted-by":"publisher","first-page":"1248","DOI":"10.1109\/5.622505","volume":"85","author":"P Pavan","year":"1997","unstructured":"Pavan P, Bez R, Olivo P, Zanoni E (1997) Flash memory cells-an overview. Proc IEEE 85(8):1248\u20131271","journal-title":"Proc IEEE"},{"key":"2156_CR78","unstructured":"Gu C, Liu W, Cui Y, Hanley N, O\u2019Neill M, Lombardi F (2019) A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation. IEEE Transactions on Emerging Topics in Computing (TETC)"},{"key":"2156_CR79","doi-asserted-by":"crossref","unstructured":"Sahoo DP, Chakraborty RS, Mukhopadhyay D (2015) Towards ideal arbiter PUF design on Xilinx FPGA: a practitioners perspective. In: Euromicro conference on digital system De","DOI":"10.1109\/DSD.2015.51"},{"key":"2156_CR80","doi-asserted-by":"crossref","unstructured":"Machida T, Yamamoto D, Iwamoto M, Sakiyama K (2015) A new arbiter PUF for enhancing unpredictability on FPGA. Sci World J 2015(13)","DOI":"10.1155\/2015\/864812"},{"key":"2156_CR81","doi-asserted-by":"crossref","unstructured":"Maiti A, Gunreddy V, Schaumont P (2013) A systematic method to evaluate and compare the performance of physical unclonable functions. In: Springer New York, Springer New York. New York, NY. pp 245\u2013267","DOI":"10.1007\/978-1-4614-1362-2_11"},{"key":"2156_CR82","doi-asserted-by":"crossref","unstructured":"Hori Y, Yoshida T, Katashita T, Satoh A (2010) Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs. In: International conference on reconfigurable computing and FPGAs. pp 298\u2013303","DOI":"10.1109\/ReConFig.2010.24"},{"key":"2156_CR83","doi-asserted-by":"crossref","unstructured":"Anandakumar NN, Hashmi MS, Sanadhya SK (2017) Compact implementations of FPGA-based PUFs with enhanced performance. In: 30th international conference on VLSI design and 16th international conference on embedded systems (VLSID). pp 161\u2013166","DOI":"10.1109\/VLSID.2017.7"},{"key":"2156_CR84","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1109\/TIFS.2020.2968113","volume":"15","author":"SVS Avvaru","year":"2020","unstructured":"Avvaru SVS, Zeng Z, Parhi KK (2020) Homogeneous and heterogeneous feed-forward XOR physical unclonable functions. IEEE Trans Inf Forensics Secur 15:2485\u20132498","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2156_CR85","doi-asserted-by":"crossref","unstructured":"Kalanadhabhatta S, Kumar D, Anumandla K, Reddy S, Acharyya A (2020) PUF-based secure chaotic random number generator design methodology. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 1\u20135","DOI":"10.1109\/TVLSI.2020.2979269"},{"key":"2156_CR86","doi-asserted-by":"crossref","unstructured":"Wang Q, Gao M, Qu G (2019) PUF-PassSE: A PUF based password strength enhancer for IoT applications. In: 20th International Symposium on Quality Electronic Design (ISQED). IEEE, pp 198\u2013203","DOI":"10.1109\/ISQED.2019.8697540"},{"key":"2156_CR87","unstructured":"Cambou B (2018) Addressable PUF generators for database-free password management system. In: CryptArchi"},{"key":"2156_CR88","unstructured":"Cambou B (2020) Secure digital signatures using physical unclonable function devices with reduced error rates (US Patent App. 16\/560, 502)"},{"key":"2156_CR89","unstructured":"Cambou B (2019) Data compiler for true random number generation and related methods\u00a0(US Patent 10, 175, 949)"},{"key":"2156_CR90","doi-asserted-by":"crossref","unstructured":"Kroeger T, Cheng W, Guilley S, Danger J-L, Karimi N (2022) Assessment and mitigation of power side-channel-based cross-PUF attacks on arbiter-PUFs and their derivatives. IEEE Trans Very Large Scale Integration (VLSI) Syst 30(2):187\u2013200","DOI":"10.1109\/TVLSI.2021.3129141"},{"key":"2156_CR91","doi-asserted-by":"crossref","unstructured":"Ji Y, Zhang X, Ji S, Luo X, Wang T (2018) Model-reuse attacks on deep learning systems. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. pp 349\u2013363","DOI":"10.1145\/3243734.3243757"},{"key":"2156_CR92","doi-asserted-by":"crossref","unstructured":"Hu H, Pang J (2021) Stealing machine learning models: attacks and countermeasures for generative adversarial networks. In: Proceedings of the 37th annual computer security applications conference. pp 1\u201316","DOI":"10.1145\/3485832.3485838"},{"key":"2156_CR93","doi-asserted-by":"crossref","unstructured":"Yu S, Park K, Park Y (2025) A machine learning attack-resistant PUF-based robust and efficient mutual authentication scheme in Fog-enabled IoT environments. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2025.3544443"},{"key":"2156_CR94","doi-asserted-by":"publisher","first-page":"106072","DOI":"10.1016\/j.mejo.2023.106072","volume":"144","author":"J Bian","year":"2024","unstructured":"Bian J, Huang Z, Lin Y, Yang Z, Liang H, Ni T (2024) Reliability analysis and comparison of ring-PUF based on probabilistic models. Microelectron J 144:106072","journal-title":"Microelectron J"},{"key":"2156_CR95","doi-asserted-by":"publisher","unstructured":"Majzoobi M, Koushanfar F, Potkonjak M (2008) Lightweight secure PUFs. In: Proceedings of the 2008 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), IEEE Computer Society \/ ACM, pp 670\u2013673. https:\/\/doi.org\/10.1109\/ICCAD.2008.4681648","DOI":"10.1109\/ICCAD.2008.4681648"},{"key":"2156_CR96","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair U, Sehnke F, S\u00f6lter J, Dror G, Devadas S, Schmidhuber J (2010) Modeling attacks on physical unclonable functions. ACM conference on Computer and communications security 237\u2013249","DOI":"10.1145\/1866307.1866335"},{"issue":"1","key":"2156_CR97","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2009.2036472","volume":"5","author":"M-D Yu","year":"2010","unstructured":"Yu M-D, Devadas S (2010) Secure and robust error correction for physical unclonable functions. IEEE Trans Inf Forensics Secur 5(1):48\u201365. https:\/\/doi.org\/10.1109\/TIFS.2009.2036472","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02156-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02156-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02156-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:38:03Z","timestamp":1765622283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02156-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":97,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2156"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02156-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"4 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"315"}}