{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T17:10:23Z","timestamp":1778605823207,"version":"3.51.4"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100021115","name":"Indian Institute of Technology Jammu","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100021115","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.compeleceng.2026.111143","type":"journal-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:05:51Z","timestamp":1775156751000},"page":"111143","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["SRAM PUF-based logic locking framework for IoT authentication and IP protection"],"prefix":"10.1016","volume":"135","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4907-4249","authenticated-orcid":false,"given":"Chandranshu","family":"Gupta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2357-6382","authenticated-orcid":false,"given":"Gaurav","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5247-6535","authenticated-orcid":false,"given":"Mahendra Kumar","family":"Gurve","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5363-3519","authenticated-orcid":false,"given":"Gaurav","family":"Varshney","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0186-1446","authenticated-orcid":false,"given":"Satyadev","family":"Ahlawat","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.compeleceng.2026.111143_b1","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1109\/JSAC.2020.3020605","article-title":"HARCI: A two-way authentication protocol for three entity healthcare IoT networks","volume":"39","author":"Alladi","year":"2020","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111143_b2","doi-asserted-by":"crossref","first-page":"2948","DOI":"10.1109\/JSYST.2020.3000269","article-title":"A lightweight protocol for secure data provenance in the Internet of Things using wireless fingerprints","volume":"15","author":"Aman","year":"2020","journal-title":"IEEE Syst J"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111143_b3","doi-asserted-by":"crossref","first-page":"8547","DOI":"10.1109\/JIOT.2022.3202265","article-title":"PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IoT","volume":"10","author":"Roy","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111143_b4","doi-asserted-by":"crossref","first-page":"11384","DOI":"10.1109\/TII.2024.3403265","article-title":"A lightweight authentication protocol for IoT-based applications using reconfigurable noisy PUFs","volume":"20","author":"Modarres","year":"2024","journal-title":"IEEE Trans Ind Informatics"},{"key":"10.1016\/j.compeleceng.2026.111143_b5","doi-asserted-by":"crossref","DOI":"10.1109\/TVLSI.2024.3411033","article-title":"ALT-Lock: Logic and timing ambiguity-based IP obfuscation against reverse engineering","author":"Talukdar","year":"2024","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"10.1016\/j.compeleceng.2026.111143_b6","doi-asserted-by":"crossref","unstructured":"Roy JA, Koushanfar F, Markov IL. EPIC: Ending piracy of integrated circuits. In: Proceedings of the conference on design, automation and test in Europe. 2008, p. 1069\u201374.","DOI":"10.1145\/1403375.1403631"},{"key":"10.1016\/j.compeleceng.2026.111143_b7","series-title":"Proceedings of the IEEE international symposium on hardware oriented security and trust","first-page":"262","article-title":"The key is left under the mat: On the inappropriate security assumption of logic locking schemes","author":"Rahman","year":"2020"},{"key":"10.1016\/j.compeleceng.2026.111143_b8","doi-asserted-by":"crossref","unstructured":"Gupta C, Kumar G, Kumar M, Ahlawat S, Varshney G. SRAM PUF-Based logic locking for secure authentication and IP protection. In: Proceedings of the 23rd ACM conference on embedded networked sensor systems. 2025, p. 660\u20131.","DOI":"10.1145\/3715014.3724057"},{"key":"10.1016\/j.compeleceng.2026.111143_b9","article-title":"Advances in logic locking: Past, present, and prospects","author":"Kamali","year":"2022","journal-title":"Cryptol EPrint Arch"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111143_b10","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1109\/JIOT.2017.2703088","article-title":"Mutual authentication in IoT systems using physical unclonable functions","volume":"4","author":"Aman","year":"2017","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111143_b11","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2024.3451357","article-title":"Device-side lightweight mutual authentication and key agreement scheme based on chameleon hashing for Industrial Internet of Things","author":"Zhang","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111143_b12","doi-asserted-by":"crossref","first-page":"5904","DOI":"10.1109\/JIOT.2020.3032518","article-title":"SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices","volume":"8","author":"Farha","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111143_b13","series-title":"Proceedings of the IEEE international conference on pervasive computing and communications workshops","first-page":"912","article-title":"Building secure SRAM PUF key generators on resource constrained devices","author":"Gao","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111143_b14","series-title":"Proceedings of the international symposium on embedded computing and system design","first-page":"183","article-title":"A PUF based light weight protocol for secure WiFi authentication of IoT devices","author":"Mahalat","year":"2018"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111143_b15","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/LES.2023.3299200","article-title":"Practical and efficient PUF-based protocol for authentication and key agreement in IoT","volume":"16","author":"Manivannan","year":"2023","journal-title":"IEEE Embed Syst Lett"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111143_b16","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/TDSC.2018.2832201","article-title":"Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database","volume":"16","author":"Chatterjee","year":"2018","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111143_b17","doi-asserted-by":"crossref","first-page":"5487","DOI":"10.1109\/JSEN.2020.3028872","article-title":"A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT","volume":"21","author":"Li","year":"2020","journal-title":"IEEE Sensors J"},{"key":"10.1016\/j.compeleceng.2026.111143_b18","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2025.3602311","article-title":"RePUF-IoT: Reconfigurable PUF-based authentication protocol for IoT-driven healthcare systems","author":"Tanveer","year":"2025","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"10.1016\/j.compeleceng.2026.111143_b19","doi-asserted-by":"crossref","first-page":"1952","DOI":"10.1109\/TCAD.2019.2944586","article-title":"Keynote: A disquisition on logic locking","volume":"39","author":"Chakraborty","year":"2019","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"10.1016\/j.compeleceng.2026.111143_b20","doi-asserted-by":"crossref","unstructured":"Rajendran J, Pino Y, Sinanoglu O, Karri R. Security analysis of logic obfuscation. In: Proceedings of the annual design automation conference. 2012, p. 83\u20139.","DOI":"10.1145\/2228360.2228377"},{"key":"10.1016\/j.compeleceng.2026.111143_b21","series-title":"Proceedings of the IEEE international symposium on hardware oriented security and trust","first-page":"95","article-title":"AppSAT: Approximately deobfuscating integrated circuits","author":"Shamsi","year":"2017"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111143_b22","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/TCAD.2018.2801220","article-title":"Anti-SAT: Mitigating SAT attack on logic locking","volume":"38","author":"Xie","year":"2018","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"10.1016\/j.compeleceng.2026.111143_b23","series-title":"Proceedings of the cryptographic hardware and embedded systems","first-page":"147","article-title":"No place to hide: Contactless probing of secret data on FPGAs","author":"Lohrke","year":"2016"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111143_b24","first-page":"1","article-title":"A unified approach to a secure and lightweight mutual authentication protocol using pre-characterized COTS SRAM ICs for IoT applications","volume":"24","author":"Gupta","year":"2025","journal-title":"ACM Trans Embed Comput Syst"},{"key":"10.1016\/j.compeleceng.2026.111143_b25","series-title":"Proceedings of the international conference on information security","first-page":"171","article-title":"Trivium: A stream cipher construction inspired by block cipher design principles","author":"De Canni\u00e8re","year":"2006"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111143_b26","doi-asserted-by":"crossref","first-page":"1971","DOI":"10.1109\/TII.2021.3096048","article-title":"A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of Medical Things","volume":"18","author":"Gope","year":"2021","journal-title":"IEEE Trans Ind Informatics"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111143_b27","doi-asserted-by":"crossref","first-page":"3299","DOI":"10.1109\/TDSC.2022.3193570","article-title":"PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications","volume":"20","author":"Zheng","year":"2022","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"10.1016\/j.compeleceng.2026.111143_b28","doi-asserted-by":"crossref","first-page":"21807","DOI":"10.1109\/ACCESS.2024.3361921","article-title":"A new PUF-based protocol for mutual authentication and key agreement between three layers of entities in cloud-based IoMT networks","volume":"12","author":"Modarres","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111143_b29","series-title":"Long-term assessment of SRAM physical unclonable functions on the ESP32 : Analysing RTC SLOW memory for building secure IoT authentication systems","author":"Lepuschitz","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111143_b30","series-title":"2014 IEEE international symposium on hardware-oriented security and trust","first-page":"101","article-title":"Bit selection algorithm suitable for high-volume production of SRAM-PUF","author":"Xiao","year":"2014"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002156?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626002156?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:29:08Z","timestamp":1778603348000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626002156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":30,"alternative-id":["S0045790626002156"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111143","relation":{"is-supplemented-by":[{"id-type":"uri","id":"https:\/\/github.com\/chandranshu09\/sram-puf","asserted-by":"subject"}]},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SRAM PUF-based logic locking framework for IoT authentication and IP protection","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111143","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111143"}}