{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T17:23:47Z","timestamp":1774027427880,"version":"3.50.1"},"reference-count":88,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T00:00:00Z","timestamp":1491350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Des. Autom. Electron. Syst."],"published-print":{"date-parts":[[2017,7,31]]},"abstract":"<jats:p>\n            The Internet of Things (IoT) is transforming the way we live and work by increasing the connectedness of people and things on a scale that was once unimaginable. However, the vulnerabilities in the IoT supply chain have raised serious concerns about the security and trustworthiness of IoT devices and components within them. Testing for device provenance, detection of counterfeit integrated circuits (ICs) and systems, and traceability of IoT devices are challenging issues to address. In this article, we develop a novel radio-frequency identification (RFID)-based system suitable for counterfeit detection, traceability, and authentication in the IoT supply chain called\n            <jats:italic>CDTA<\/jats:italic>\n            . CDTA is composed of different types of on-chip sensors and in-system structures that collect necessary information to detect multiple counterfeit IC types (recycled, cloned, etc.), track and trace IoT devices, and verify the overall system authenticity. Central to CDTA is an RFID tag employed as storage and a channel to read the information from different types of chips on the printed circuit board (PCB) in both power-on and power-off scenarios. CDTA sensor data can also be sent to the remote server for authentication via an encrypted Ethernet channel when the IoT device is deployed in the field. A novel board ID generator is implemented by combining outputs of physical unclonable functions (PUFs) embedded in the RFID tag and different chips on the PCB. A light-weight RFID protocol is proposed to enable mutual authentication between RFID readers and tags. We also implement a secure interchip communication on the PCB. Simulations and experimental results using Spartan 3E FPGAs demonstrate the effectiveness of this system. The efficiency of the radio-frequency (RF) communication has also been verified via a PCB prototype with a printed slot antenna.\n          <\/jats:p>","DOI":"10.1145\/3005346","type":"journal-article","created":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T12:13:39Z","timestamp":1491221619000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["CDTA"],"prefix":"10.1145","volume":"22","author":[{"given":"Kun","family":"Yang","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Domenic","family":"Forte","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Mark M.","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2017,4,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2010.5419927"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7"},{"key":"e_1_2_1_3_1","volume-title":"Retrieved","author":"Arthur Charles","year":"2009","unstructured":"Charles Arthur . 2009 . Microsoft Cutting Off Up to 1M Gamers with Modified Xbox 360 Consoles . Retrieved January 25, 2017, from http:\/\/www.theguardian.com\/technology\/2009\/nov\/11\/xbox-modded-consoles-live-cut-microsoft. Charles Arthur. 2009. Microsoft Cutting Off Up to 1M Gamers with Modified Xbox 360 Consoles. Retrieved January 25, 2017, from http:\/\/www.theguardian.com\/technology\/2009\/nov\/11\/xbox-modded-consoles-live-cut-microsoft."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"e_1_2_1_5_1","volume-title":"Retrieved","author":"Bernstein Kerry","year":"2014","unstructured":"Kerry Bernstein . 2014 . Supply Chain Hardware Integrity for Electronics Defense (SHIELD) . Retrieved January 25, 2017, from http:\/\/www.darpa.mil\/program\/supply-chain-hardware-integrity-for-electronics-defense. Kerry Bernstein. 2014. Supply Chain Hardware Integrity for Electronics Defense (SHIELD). Retrieved January 25, 2017, from http:\/\/www.darpa.mil\/program\/supply-chain-hardware-integrity-for-electronics-defense."},{"key":"e_1_2_1_6_1","unstructured":"James Carbone. 2012. Most counterfeit parts involve obsolete semiconductors and other EOL components. The Source August 48.  James Carbone. 2012. Most counterfeit parts involve obsolete semiconductors and other EOL components. The Source August 48."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2009.5340158"},{"key":"e_1_2_1_8_1","first-page":"164","article-title":"Guidelines on hardware-rooted security in mobile devices (Draft)","volume":"800","author":"Chen Lily","year":"2012","unstructured":"Lily Chen , Joshua Franklin , and Andrew Regenscheid . 2012 . Guidelines on hardware-rooted security in mobile devices (Draft) . NIST Special Publication 800 , 164 . Lily Chen, Joshua Franklin, and Andrew Regenscheid. 2012. Guidelines on hardware-rooted security in mobile devices (Draft). NIST Special Publication 800, 164.","journal-title":"NIST Special Publication"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5955011"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 2014 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS\u201914)","author":"Choden Konigsmark Sven T.","unstructured":"Sven T. Choden Konigsmark , Leslie K. Hwang , Deming Chen , and Martin D. F. Wong . 2014. System-of-PUFs: Multilevel security for embedded systems . In Proceedings of the 2014 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS\u201914) . IEEE, Los Alamitos, CA, 1--10. Sven T. Choden Konigsmark, Leslie K. Hwang, Deming Chen, and Martin D. F. Wong. 2014. System-of-PUFs: Multilevel security for embedded systems. In Proceedings of the 2014 International Conference on Hardware\/Software Codesign and System Synthesis (CODES+ISSS\u201914). IEEE, Los Alamitos, CA, 1--10."},{"key":"e_1_2_1_11_1","volume-title":"Retrieved","author":"Cicerchi Tim","year":"2014","unstructured":"Tim Cicerchi . 2014 . High-Capacity RFID Tags . Retrieved January 25, 2017, from http:\/\/blog.pepperl-fuchs.us\/high-capacity-rfid-tags. Tim Cicerchi. 2014. High-Capacity RFID Tags. Retrieved January 25, 2017, from http:\/\/blog.pepperl-fuchs.us\/high-capacity-rfid-tags."},{"key":"e_1_2_1_12_1","volume-title":"Retrieved","year":"2014","unstructured":"Cisco. 2014 . How Cisco Transformed Its Supply Chain . Retrieved January 25, 2017, from http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/enterprise\/cisco-on-cisco\/cs-boit-05272014-supply-chain.html. Cisco. 2014. How Cisco Transformed Its Supply Chain. Retrieved January 25, 2017, from http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/enterprise\/cisco-on-cisco\/cs-boit-05272014-supply-chain.html."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680487"},{"key":"e_1_2_1_14_1","volume-title":"Supply Chain Management: A Logistics Perspective. Cengage Learning","author":"Coyle John","unstructured":"John Coyle , C. John Langley , Robert Novack , and Brian Gibson . 2012. Supply Chain Management: A Logistics Perspective. Cengage Learning , Independence, KY . John Coyle, C. John Langley, Robert Novack, and Brian Gibson. 2012. Supply Chain Management: A Logistics Perspective. Cengage Learning, Independence, KY."},{"key":"e_1_2_1_15_1","unstructured":"Joan Daemen and Vincent Rijmen. 1999. AES Proposal: Rijndael.  Joan Daemen and Vincent Rijmen. 1999. AES Proposal: Rijndael."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2006.07.022"},{"key":"e_1_2_1_17_1","volume-title":"Retrieved","author":"Department of Justice.","year":"2010","unstructured":"Department of Justice. 2010 . Departments of Justice and Homeland Security Announce 30 Convictions, More Than &dollar;143 Million in Seizures from Initiative Targeting Traffickers in Counterfeit Network Hardware . Retrieved January 25, 2017, from http:\/\/www.justice.gov\/opa\/pr\/departments-justice-and-homeland-security-announce-30-convictions-more-143-million-seizures. Department of Justice. 2010. Departments of Justice and Homeland Security Announce 30 Convictions, More Than &dollar;143 Million in Seizures from Initiative Targeting Traffickers in Counterfeit Network Hardware. Retrieved January 25, 2017, from http:\/\/www.justice.gov\/opa\/pr\/departments-justice-and-homeland-security-announce-30-convictions-more-143-million-seizures."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"e_1_2_1_19_1","unstructured":"John R. Ellement. 2014. Three Men Face Charges in &dollar;1M Computer Parts Theft Ring. Available at https:\/\/www.bostonglobe.com.  John R. Ellement. 2014. Three Men Face Charges in &dollar;1M Computer Parts Theft Ring. Available at https:\/\/www.bostonglobe.com."},{"key":"e_1_2_1_20_1","volume-title":"Retrieved","author":"EPC Global Inc.","year":"2015","unstructured":"EPC Global Inc. 2015 . EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID: Protocol for Communications at 860 MHz - 960 MHz Version 2.0.1 . Retrieved January 25, 2017, from http:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf. EPC Global Inc. 2015. EPC Radio-Frequency Identity Protocols Generation-2 UHF RFID: Protocol for Communications at 860 MHz - 960 MHz Version 2.0.1. Retrieved January 25, 2017, from http:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/Gen2_Protocol_Standard.pdf."},{"key":"e_1_2_1_21_1","unstructured":"Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. CISCO White Paper 1. Cisco.  Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. CISCO White Paper 1. Cisco."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378272"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Alan Freier Philip Karlton and Paul Kocher. 2011. The Secure Sockets Layer (SSL) Protocol Version 3.0.  Alan Freier Philip Karlton and Paul Kocher. 2011. The Secure Sockets Layer (SSL) Protocol Version 3.0.","DOI":"10.17487\/rfc6101"},{"key":"e_1_2_1_24_1","unstructured":"Fujitsu. 2014. World\u2019s Largest-Capacity 64KByte FRAM Metal Mount RFID Tag.  Fujitsu. 2014. World\u2019s Largest-Capacity 64KByte FRAM Metal Mount RFID Tag."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5428-2"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10836-013-5430-8"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2466551"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593157"},{"key":"e_1_2_1_29_1","first-page":"1","article-title":"Mod chips and homebrew: A recipe for their continued use in the wake of Sony v. Divineo","volume":"9","author":"Harris Phillip A.","year":"2007","unstructured":"Phillip A. Harris Jr . 2007 . Mod chips and homebrew: A recipe for their continued use in the wake of Sony v. Divineo . North Carolina Journal of Law and Technology 9 , 1 , 113. Phillip A. Harris Jr. 2007. Mod chips and homebrew: A recipe for their continued use in the wake of Sony v. Divineo. North Carolina Journal of Law and Technology 9, 1, 113.","journal-title":"North Carolina Journal of Law and Technology"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372562"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962097"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516717"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276922"},{"key":"e_1_2_1_34_1","volume-title":"Retrieved","author":"Holmes Christopher","year":"2015","unstructured":"Christopher Holmes . 2015 . Designing and Implementing the Factory of the Future at Mahindra Vehicle Manufacturers . Retrieved January 25, 2017, from http:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/industry-solutions\/idc-manufacturing.pdf. Christopher Holmes. 2015. Designing and Implementing the Factory of the Future at Mahindra Vehicle Manufacturers. Retrieved January 25, 2017, from http:\/\/www.cisco.com\/c\/dam\/en\/us\/solutions\/collateral\/industry-solutions\/idc-manufacturing.pdf."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2014.70"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5955222"},{"key":"e_1_2_1_37_1","volume-title":"Retrieved","author":"IEEE Computer Society","year":"2009","unstructured":"IEEE Computer Society . 2009 . IEEE Standard for Local and Metropolitan Area Networks\u2014Secure Device Identity . Retrieved January 25, 2017, from https:\/\/standards.ieee.org\/findstds\/standard\/802.1AR-2009.html. IEEE Computer Society. 2009. IEEE Standard for Local and Metropolitan Area Networks\u2014Secure Device Identity. Retrieved January 25, 2017, from https:\/\/standards.ieee.org\/findstds\/standard\/802.1AR-2009.html."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517976"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2003.817249"},{"key":"e_1_2_1_40_1","volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2014. Introduction to Modern Cryptography . CRC Press , Boca Raton, FL . Jonathan Katz and Yehuda Lindell. 2014. Introduction to Modern Cryptography. CRC Press, Boca Raton, FL."},{"key":"e_1_2_1_41_1","volume-title":"Integration and Innovation Orient to E-Society","author":"Kim Jongki","unstructured":"Jongki Kim , Chao Yang , and Jinhwan Jeon . 2007. A research on issues related to RFID security and privacy . In Integration and Innovation Orient to E-Society Volume 2 . Springer , 412--420. Jongki Kim, Chao Yang, and Jinhwan Jeon. 2007. A research on issues related to RFID security and privacy. In Integration and Innovation Orient to E-Society Volume 2. Springer, 412--420."},{"key":"e_1_2_1_42_1","volume-title":"Procedings of the 2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC\u201914)","author":"Konigsmark S. T.","unstructured":"S. T. Konigsmark , Leslie K. Hwang , Deming Chen , and Martin D. F. Wong . 2014. CNPUF: A carbon nanotube-based physically unclonable function for secure low-energy hardware design . In Procedings of the 2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC\u201914) . IEEE, Los Alamitos, CA, 73--78. S. T. Konigsmark, Leslie K. Hwang, Deming Chen, and Martin D. F. Wong. 2014. CNPUF: A carbon nanotube-based physically unclonable function for secure low-energy hardware design. In Procedings of the 2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC\u201914). IEEE, Los Alamitos, CA, 73--78."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2163307"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378568"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2008.4559053"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2009.4911190"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_20"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.105"},{"key":"e_1_2_1_49_1","volume-title":"Retrieved","author":"Livingston Henry","year":"2013","unstructured":"Henry Livingston . 2013 . Counterfeit Incident Reporting Trends\u2014Observations in Anticipation of Forthcoming Regulations . Retrieved January 25, 2017, from http:\/\/counterfeitparts.wordpress.com\/2013\/08\/06\/counterfeit-incident-reporting-trends-observations-in-anticipation-of-forthcoming-regulations\/. Henry Livingston. 2013. Counterfeit Incident Reporting Trends\u2014Observations in Anticipation of Forthcoming Regulations. Retrieved January 25, 2017, from http:\/\/counterfeitparts.wordpress.com\/2013\/08\/06\/counterfeit-incident-reporting-trends-observations-in-anticipation-of-forthcoming-regulations\/."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"e_1_2_1_52_1","volume-title":"Retrieved","author":"Mitchell Bradley","year":"2011","unstructured":"Bradley Mitchell . 2011 . Network Engineer Charged in Multi-Million Dollar Cisco Equipment Theft . Retrieved January 25, 2017, from https:\/\/twitter.com\/aboutnetworking\/status\/145707010262958080 Bradley Mitchell. 2011. Network Engineer Charged in Multi-Million Dollar Cisco Equipment Theft. Retrieved January 25, 2017, from https:\/\/twitter.com\/aboutnetworking\/status\/145707010262958080"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIECPC.2013.6551028"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the RFID Privacy Workshop","volume":"82","author":"Ohkubo Miyako","year":"2003","unstructured":"Miyako Ohkubo , Koutarou Suzuki , and Shingo Kinoshita . 2003 . Cryptographic approach to \u201cprivacy-friendly\u201d tags . In Proceedings of the RFID Privacy Workshop , Vol. 82 . Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita. 2003. Cryptographic approach to \u201cprivacy-friendly\u201d tags. In Proceedings of the RFID Privacy Workshop, Vol. 82."},{"key":"e_1_2_1_56_1","volume-title":"Ubiquitous Computing: Smart Devices, Environments and Interactions","author":"Poslad Stefan","year":"2011","unstructured":"Stefan Poslad . 2011 . Ubiquitous Computing: Smart Devices, Environments and Interactions . John Wiley 8 Sons. Stefan Poslad. 2011. Ubiquitous Computing: Smart Devices, Environments and Interactions. John Wiley 8 Sons."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2755563"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228377"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2012.40"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516656"},{"key":"e_1_2_1_61_1","first-page":"405","article-title":"Cryptographic communications system and method","volume":"4","author":"Rivest Ronald L.","year":"1983","unstructured":"Ronald L. Rivest , Adi Shamir , and Leonard M. Adleman . 1983 . Cryptographic communications system and method . US Patent 4 , 405 ,829. Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. 1983. Cryptographic communications system and method. US Patent 4,405,829.","journal-title":"US Patent"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.664"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"e_1_2_1_64_1","volume-title":"Stolfo","author":"Salem Malek Ben","year":"2008","unstructured":"Malek Ben Salem , Shlomo Hershkop , and Salvatore J . Stolfo . 2008 . A survey of insider attack detection research. In Insider Attack and Cyber Security. Advances in Information Security, Vol. 39 . Springer , 69--90. Malek Ben Salem, Shlomo Hershkop, and Salvatore J. Stolfo. 2008. A survey of insider attack detection research. In Insider Attack and Cyber Security. Advances in Information Security, Vol. 39. Springer, 69--90."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6699050"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01009-X"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.910961"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.264"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11824-6_4"},{"key":"e_1_2_1_71_1","volume-title":"Introduction to Hardware Security and Trust","author":"Tehranipoor Mohammad","unstructured":"Mohammad Tehranipoor and Cliff Wang . 2011. Introduction to Hardware Security and Trust . Springer Science 8 Business Media. Mohammad Tehranipoor and Cliff Wang. 2011. Introduction to Hardware Security and Trust. Springer Science 8 Business Media."},{"key":"e_1_2_1_72_1","volume-title":"21st Century Management: A Reference Handbook","author":"Wankel Charles","unstructured":"Charles Wankel . 2007. 21st Century Management: A Reference Handbook . Sage . Charles Wankel. 2007. 21st Century Management: A Reference Handbook. Sage."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.2"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372563"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"e_1_2_1_76_1","volume-title":"Handout of the Ecrypt Workshop on RFID and Lightweight Crypto","volume":"10","author":"Yang Jeongkyu","year":"2005","unstructured":"Jeongkyu Yang , Jaemin Park , Hyunrok Lee , Kui Ren , and Kwangjo Kim . 2005 . Mutual authentication protocol for low-cost RFID . In Handout of the Ecrypt Workshop on RFID and Lightweight Crypto , Vol. 10 . 15. Jeongkyu Yang, Jaemin Park, Hyunrok Lee, Kui Ren, and Kwangjo Kim. 2005. Mutual authentication protocol for low-cost RFID. In Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, Vol. 10. 15."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24837-0_3"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2015.7225279"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2015.7372591"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2010.2063930"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2010.5433893"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the 20th Annual Network and Distributed System Security Symposium.","author":"Zanetti Davide","year":"2013","unstructured":"Davide Zanetti , Srdjan Capkun , and Ari Juels . 2013 . Tailing RFID tags for clone detection . In Proceedings of the 20th Annual Network and Distributed System Security Symposium. Davide Zanetti, Srdjan Capkun, and Ari Juels. 2013. Tailing RFID tags for clone detection. In Proceedings of the 20th Annual Network and Distributed System Security Symposium."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2010.5467257"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2015.7116294"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2264063"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228486"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2008.09.017"}],"container-title":["ACM Transactions on Design Automation of Electronic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3005346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:50Z","timestamp":1750220630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3005346"}},"subtitle":["A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain"],"short-title":[],"issued":{"date-parts":[[2017,4,5]]},"references-count":88,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,7,31]]}},"alternative-id":["10.1145\/3005346"],"URL":"https:\/\/doi.org\/10.1145\/3005346","relation":{},"ISSN":["1084-4309","1557-7309"],"issn-type":[{"value":"1084-4309","type":"print"},{"value":"1557-7309","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,5]]},"assertion":[{"value":"2016-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}