{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:32:45Z","timestamp":1764333165911,"version":"3.40.5"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Microelectronics Journal"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1016\/j.mejo.2022.105497","type":"journal-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T12:48:17Z","timestamp":1655815697000},"page":"105497","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"special_numbering":"C","title":["A low-overhead PUF for anti-clone attack of RFID tags"],"prefix":"10.1016","volume":"126","author":[{"given":"Chen","family":"Shuyu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6777-0075","authenticated-orcid":false,"given":"Yan","family":"Limin","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.mejo.2022.105497_bib1","series-title":"Clock Tree Construction Using Gated Clock cloning[C]\/\/2012 4th Asia Symposium on Quality Electronic Design (ASQED)","first-page":"54","author":"Chen","year":"2012"},{"issue":"30","key":"10.1016\/j.mejo.2022.105497_bib2","first-page":"736","article-title":"Radio frequency identification (RFID) pin detection system","volume":"7","author":"Bouchard","year":"2006","journal-title":"U.S. Patent"},{"year":"2006","series-title":"Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and cloning[C]\/\/SCIS 2006","author":"Duc","key":"10.1016\/j.mejo.2022.105497_bib3"},{"issue":"9","key":"10.1016\/j.mejo.2022.105497_bib4","doi-asserted-by":"crossref","first-page":"2902","DOI":"10.3390\/s18092902","article-title":"Comparison and feasibility of various RFID authentication methods using ECC[J]","volume":"18","author":"Alexander","year":"2018","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.mejo.2022.105497_bib5","first-page":"72","article-title":"IoT: effective authentication system (EAS) using hash based encryption on RFID attacks[J]","volume":"10","author":"Sivakumar","year":"2020","journal-title":"Int. J. Eng. Manag. Res. (IJEMR)"},{"issue":"5589","key":"10.1016\/j.mejo.2022.105497_bib6","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical one-way functions[J]","volume":"297","author":"Pappu","year":"2002","journal-title":"Science"},{"key":"10.1016\/j.mejo.2022.105497_bib7","series-title":"Physical Unclonable Functions for Device Authentication and Secret Key generation[C]\/\/2007 44th ACM\/IEEE Design Automation Conference","first-page":"9","author":"Suh","year":"2007"},{"key":"10.1016\/j.mejo.2022.105497_bib8","series-title":"A Large Scale Characterization of RO-PUF[C]\/\/2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","first-page":"94","author":"Maiti","year":"2010"},{"key":"10.1016\/j.mejo.2022.105497_bib9","series-title":"A Technique to Build a Secret Key in Integrated Circuits for Identification and Authentication applications[C]\/\/2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525)","first-page":"176","author":"Lee","year":"2004"},{"issue":"2","key":"10.1016\/j.mejo.2022.105497_bib10","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s00145-010-9088-4","article-title":"Improved ring oscillator PUF: an FPGA-friendly secure primitive[J]","volume":"24","author":"Maiti","year":"2011","journal-title":"J. Cryptol."},{"key":"10.1016\/j.mejo.2022.105497_bib11","series-title":"Low-cost Configurable Ring Oscillator PUF with Improved uniqueness[C]\/\/2016 IEEE International Symposium on Circuits and Systems (ISCAS)","first-page":"558","author":"Cui","year":"2016"},{"key":"10.1016\/j.mejo.2022.105497_bib12","doi-asserted-by":"crossref","DOI":"10.1016\/j.mejo.2021.105263","article-title":"A high reliability physically unclonable function based on multiple tunable ring oscillator[J]","volume":"117","author":"Zhang","year":"2021","journal-title":"Microelectron. J."},{"key":"10.1016\/j.mejo.2022.105497_bib13","first-page":"83","article-title":"A lightweight configurable XOR RO-PUF design based on Xilinx FPGA[C]\/\/2021 IEEE 4th international conference on electronics Technology (ICET)","author":"Yao","year":"2021","journal-title":"IEEE"},{"issue":"4","key":"10.1016\/j.mejo.2022.105497_bib14","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TMSCS.2018.2877737","article-title":"Frequency offset-based ring oscillator physical unclonable function[J]","volume":"4","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"key":"10.1016\/j.mejo.2022.105497_bib15","series-title":"Design and Implementation of PUF-Based \u201c Unclonable \u201d RFID ICs for Anti-counterfeiting and Security applications[C]\/\/2008 IEEE International Conference on RFID","first-page":"58","author":"Devadas","year":"2008"},{"issue":"2","key":"10.1016\/j.mejo.2022.105497_bib16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3426968","article-title":"A mutual security authentication method for RFID-PUF circuit based on deep learning[J]","volume":"22","author":"Liang","year":"2021","journal-title":"ACM Trans. Internet Technol."},{"key":"10.1016\/j.mejo.2022.105497_bib17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.ins.2019.06.047","article-title":"A double PUF-based RFID identity authentication protocol in service-centric internet of things environments[J]","volume":"503","author":"Liang","year":"2019","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.mejo.2022.105497_bib18","first-page":"125","article-title":"A lightweight strong physical unclonable function design based on LFSR[J]","volume":"41","author":"Shen","year":"2020","journal-title":"J. Graphic."},{"key":"10.1016\/j.mejo.2022.105497_bib19","series-title":"A Multi-Line Arbiter PUF with Improved Reliability and uniqueness[C]\/\/2019 IEEE 4th International Conference on Signal and Image Processing (ICSIP)","first-page":"641","author":"Wen","year":"2019"},{"key":"10.1016\/j.mejo.2022.105497_bib20","doi-asserted-by":"crossref","first-page":"181751","DOI":"10.1109\/ACCESS.2020.3028514","article-title":"A highly reliable arbiter PUF with improved uniqueness in FPGA implementation using Bit-Self-Test[J]","volume":"8","author":"He","year":"2020","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.mejo.2022.105497_bib21","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TVLSI.2018.2877438","article-title":"Efficient PUF-based key generation in FPGAs using per-device configuration[J]","volume":"27","author":"Usmani","year":"2018","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"issue":"5","key":"10.1016\/j.mejo.2022.105497_bib22","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1109\/JSSC.2021.3050295","article-title":"A highly reliable RRAM physically unclonable function utilizing post-process randomness source[J]","volume":"56","author":"Lin","year":"2021","journal-title":"IEEE J. Solid State Circ."},{"issue":"12","key":"10.1016\/j.mejo.2022.105497_bib23","doi-asserted-by":"crossref","first-page":"1560","DOI":"10.3390\/mi12121560","article-title":"A novel RFID authentication protocol based on reconfigurable RRAM PUF[J]","volume":"12","author":"Ren","year":"2021","journal-title":"Micromachines"},{"key":"10.1016\/j.mejo.2022.105497_bib24","series-title":"Building Secure SRAM PUF Key Generators on Resource Constrained devices[C]\/\/2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","first-page":"912","author":"Gao","year":"2019"},{"issue":"14","key":"10.1016\/j.mejo.2022.105497_bib25","doi-asserted-by":"crossref","first-page":"3208","DOI":"10.3390\/s19143208","article-title":"Physical unclonable functions in the internet of things: state of the art and open challenges[J]","volume":"19","author":"Babaei","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.mejo.2022.105497_bib26","doi-asserted-by":"crossref","DOI":"10.1587\/elex.14.20170551","article-title":"A highly reliable butterfly PUF in SRAM-based FPGAs[J]","volume":"14","author":"Xu","year":"2017","journal-title":"IEICE Electron. Express"},{"key":"10.1016\/j.mejo.2022.105497_bib27","doi-asserted-by":"crossref","DOI":"10.1016\/j.mejo.2021.105314","article-title":"M-RO PUF: a portable pure digital RO PUF based on MUX Unit[J]","volume":"119","author":"Yao","year":"2022","journal-title":"Microelectron. J."},{"key":"10.1016\/j.mejo.2022.105497_bib28","first-page":"373","article-title":"A review\u2014hardware security using puf (physical unclonable function)[J]","volume":"2020","author":"Sakhare","year":"2019","journal-title":"ICCCE"},{"year":"2001","series-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications[R]","author":"Rukhin","key":"10.1016\/j.mejo.2022.105497_bib29"},{"issue":"4","key":"10.1016\/j.mejo.2022.105497_bib30","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1049\/iet-cds.2019.0175","article-title":"Physical unclonable function: architectures, applications and challenges for dependable security[J]","volume":"14","author":"Ning","year":"2020","journal-title":"IET Circuits, Devices Syst."},{"key":"10.1016\/j.mejo.2022.105497_bib31","article-title":"IoT application on smart and secure shopping system using RFID, Zig-Bee and gossamer protocol[J]","volume":"4","author":"Puranik","year":"2018","journal-title":"Int. J. Eng. Tech."},{"issue":"4","key":"10.1016\/j.mejo.2022.105497_bib32","first-page":"96","article-title":"A review of ultralightweight mutual authentication protocols[J]","volume":"14","author":"Mujahid","year":"2020","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"8","key":"10.1016\/j.mejo.2022.105497_bib33","doi-asserted-by":"crossref","first-page":"7025","DOI":"10.1109\/TIE.2019.2938462","article-title":"Physical unclonable function-based key sharing via machine learning for IoT security[J]","volume":"67","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.mejo.2022.105497_bib34","series-title":"UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm[C]\/\/2019 6th International Conference on Behavioral, Economic and Socio-Cultural Computing (BESC)","first-page":"1","author":"Tian","year":"2019"},{"key":"10.1016\/j.mejo.2022.105497_bib35","first-page":"1","article-title":"Gossamer: weaknesses and performance[J]","author":"D'Arco","year":"2022","journal-title":"Int. J. Inf. Secur."}],"container-title":["Microelectronics Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002626922200129X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002626922200129X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T11:55:09Z","timestamp":1720094109000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002626922200129X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":35,"alternative-id":["S002626922200129X"],"URL":"https:\/\/doi.org\/10.1016\/j.mejo.2022.105497","relation":{},"ISSN":["1879-2391"],"issn-type":[{"type":"print","value":"1879-2391"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A low-overhead PUF for anti-clone attack of RFID tags","name":"articletitle","label":"Article Title"},{"value":"Microelectronics Journal","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.mejo.2022.105497","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"105497"}}