{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:55:03Z","timestamp":1777568103686,"version":"3.51.4"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T00:00:00Z","timestamp":1598832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2020,8,31]]},"abstract":"<jats:p>In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the pervasive character of next-generation communication protocols, such as the 5G technology, have become widely evident. In this work, we identify the need for low-cost security in current and next-generation IoT networks and address this demand through the implementation, testing, and validation of an intrinsic low-cost and low-overhead hardware-based security primitive within an inherent network component. In particular, an intrinsic Physical Unclonable Function (PUF) is implemented in the peripheral network module of a tri-band commercial off-the-shelf router. Subsequently, we demonstrate the robustness of this PUF to ambient temperature variations and to limited natural aging, and examine in detail its potential for securing the next generation of IoT networks and other applications. Finally, the security of the proposed PUF-based schemes is briefly assessed and discussed.<\/jats:p>","DOI":"10.1145\/3406280","type":"journal-article","created":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T16:32:55Z","timestamp":1599323575000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Low-cost Security for Next-generation IoT Networks"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0243-8594","authenticated-orcid":false,"given":"Nikolaos Athanasios","family":"Anagnostopoulos","sequence":"first","affiliation":[{"name":"Technical University of Darmstadt, Germany and University of Passau, Passau, Bayern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6674-3761","authenticated-orcid":false,"given":"Saad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Hessen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2078-3976","authenticated-orcid":false,"given":"Tolga","family":"Arul","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany and University of Passau, Passau, Bayern, Germany"}]},{"given":"Daniel","family":"Steinmetzer","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Hessen, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Hessen, Germany"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Bayern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,9,5]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Saad Ahmad. 2018. Using Physical Unclonable Functions for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training. Master\u2019s thesis. Technische Universit\u00e4t Darmstadt.  Saad Ahmad. 2018. Using Physical Unclonable Functions for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training. Master\u2019s thesis. Technische Universit\u00e4t Darmstadt."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899013"},{"key":"e_1_2_1_3_1","volume-title":"Optical Fault Injection Attacks in Smart Card Chips and an Evaluation of Countermeasures against Them. Master\u2019s thesis","author":"Anagnostopoulos Nikolaos Athanasios","unstructured":"Nikolaos Athanasios Anagnostopoulos . 2014. Optical Fault Injection Attacks in Smart Card Chips and an Evaluation of Countermeasures against Them. Master\u2019s thesis . University of Twente . Retrieved from http:\/\/essay.utwente.nl\/66028\/7\/Anagnostopoulos_MA_EEMCS.pdf. Nikolaos Athanasios Anagnostopoulos. 2014. Optical Fault Injection Attacks in Smart Card Chips and an Evaluation of Countermeasures against Them. Master\u2019s thesis. University of Twente. Retrieved from http:\/\/essay.utwente.nl\/66028\/7\/Anagnostopoulos_MA_EEMCS.pdf."},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the Global Information Infrastructure and Networking Symposium (GIIS\u201918)","author":"Anagnostopoulos N. A.","year":"2018","unstructured":"N. A. Anagnostopoulos , T. Arul , Y. Fan , C. Hatzfeld , J. Lotichius , R. Sharma , F. Fernandes , F. Tehranipoor , and S. Katzenbeisser . 2018. Securing IoT devices using robust DRAM PUFs . In Proceedings of the Global Information Infrastructure and Networking Symposium (GIIS\u201918) . IEEE. DOI:https:\/\/doi.org\/10.1109\/GIIS. 2018 .8635789 10.1109\/GIIS.2018.8635789 N. A. Anagnostopoulos, T. Arul, Y. Fan, C. Hatzfeld, J. Lotichius, R. Sharma, F. Fernandes, F. Tehranipoor, and S. Katzenbeisser. 2018. Securing IoT devices using robust DRAM PUFs. In Proceedings of the Global Information Infrastructure and Networking Symposium (GIIS\u201918). IEEE. DOI:https:\/\/doi.org\/10.1109\/GIIS.2018.8635789"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201919)","author":"Anagnostopoulos N. A.","year":"2019","unstructured":"N. A. Anagnostopoulos , T. Arul , Y. Fan , M. Kumar , and S. Katzenbeisser . 2019. AR-PUFs: Advanced security primitives for the Internet of Things and cyber-physical systems . In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201919) . 1--5. DOI:https:\/\/doi.org\/10.1109\/ICCE. 2019 .8661840 10.1109\/ICCE.2019.8661840 N. A. Anagnostopoulos, T. Arul, Y. Fan, M. Kumar, and S. Katzenbeisser. 2019. AR-PUFs: Advanced security primitives for the Internet of Things and cyber-physical systems. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201919). 1--5. DOI:https:\/\/doi.org\/10.1109\/ICCE.2019.8661840"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2019.102864"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 21st Euromicro Conference on Digital System Design (DSD\u201918)","author":"Anagnostopoulos N. A.","year":"2018","unstructured":"N. A. Anagnostopoulos , T. Arul , M. Rosenstihl , A. Schaller , S. Gabmeyer , and S. Katzenbeisser . 2018. Low-temperature data remanence attacks against intrinsic SRAM PUFs . In Proceedings of the 21st Euromicro Conference on Digital System Design (DSD\u201918) . IEEE, 581--585. DOI:https:\/\/doi.org\/10.1109\/DSD. 2018 .00102 10.1109\/DSD.2018.00102 N. A. Anagnostopoulos, T. Arul, M. Rosenstihl, A. Schaller, S. Gabmeyer, and S. Katzenbeisser. 2018. Low-temperature data remanence attacks against intrinsic SRAM PUFs. In Proceedings of the 21st Euromicro Conference on Digital System Design (DSD\u201918). IEEE, 581--585. DOI:https:\/\/doi.org\/10.1109\/DSD.2018.00102"},{"key":"e_1_2_1_8_1","volume-title":"Efficient Helper Data Key Extractor on FPGAs","author":"B\u00f6sch Christoph","unstructured":"Christoph B\u00f6sch , Jorge Guajardo , Ahmad-Reza Sadeghi , Jamshid Shokrollahi , and Pim Tuyls . 2008. Efficient Helper Data Key Extractor on FPGAs . Springer Berlin Heidelberg , 181--197. DOI:https:\/\/doi.org\/10.1007\/978-3-540-85053-3_12 10.1007\/978-3-540-85053-3_12 Christoph B\u00f6sch, Jorge Guajardo, Ahmad-Reza Sadeghi, Jamshid Shokrollahi, and Pim Tuyls. 2008. Efficient Helper Data Key Extractor on FPGAs. Springer Berlin Heidelberg, 181--197. DOI:https:\/\/doi.org\/10.1007\/978-3-540-85053-3_12"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_2"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_2_1_11_1","volume-title":"Internet of Things","author":"Chandy John A.","unstructured":"John A. Chandy , Jim Fahrny , Asad Haque , Paul A. Wortman , Nima Karimian , and Fatemeh Tehranipoor . 2017. Exploring methods of authentication for the Internet of Things . In Internet of Things . Chapman and Hall\/CRC , 71--90. John A. Chandy, Jim Fahrny, Asad Haque, Paul A. Wortman, Nima Karimian, and Fatemeh Tehranipoor. 2017. Exploring methods of authentication for the Internet of Things. In Internet of Things. Chapman and Hall\/CRC, 71--90."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005715"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the Black Hat USA Conference.","author":"Chen K.","year":"2009","unstructured":"K. Chen . 2009 . Reversing and exploiting an Apple firmware update . In Proceedings of the Black Hat USA Conference. K. Chen. 2009. Reversing and exploiting an Apple firmware update. In Proceedings of the Black Hat USA Conference."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2018.02.001"},{"key":"e_1_2_1_15_1","volume-title":"White Paper: The Internet of Things Reference Model.","year":"2014","unstructured":"Cisco. 2014 . White Paper: The Internet of Things Reference Model. Retrieved from http:\/\/cdn.iotwf.com\/resources\/71\/IoT_Reference_Model_White_Paper_June_4_2014.pdf. Cisco. 2014. White Paper: The Internet of Things Reference Model. Retrieved from http:\/\/cdn.iotwf.com\/resources\/71\/IoT_Reference_Model_White_Paper_June_4_2014.pdf."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.63"},{"key":"e_1_2_1_20_1","unstructured":"Giulio Gianfelici Hermann Kampermann and Dagmar Bru\u00df. 2019. A theoretical framework for PUFs and QR-PUFs. arxiv:quant-ph\/1911.04981.  Giulio Gianfelici Hermann Kampermann and Dagmar Bru\u00df. 2019. A theoretical framework for PUFs and QR-PUFs. arxiv:quant-ph\/1911.04981."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS\u201916)","author":"Halak B.","year":"2016","unstructured":"B. Halak , M. Zwolinski , and M. S. Mispan . 2016. Overview of PUF-based hardware security solutions for the Internet of Things . In Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS\u201916) . IEEE, 1--4. DOI:https:\/\/doi.org\/10.1109\/MWSCAS. 2016 .7870046 10.1109\/MWSCAS.2016.7870046 B. Halak, M. Zwolinski, and M. S. Mispan. 2016. Overview of PUF-based hardware security solutions for the Internet of Things. In Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS\u201916). IEEE, 1--4. DOI:https:\/\/doi.org\/10.1109\/MWSCAS.2016.7870046"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.68"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.68"},{"key":"e_1_2_1_25_1","volume-title":"Towards Hardware-Intrinsic Security","author":"Handschuh Helena","unstructured":"Helena Handschuh , Geert-Jan Schrijen , and Pim Tuyls . 2010. Hardware intrinsic security from physically unclonable functions . In Towards Hardware-Intrinsic Security . Springer , 39--53. DOI:https:\/\/doi.org\/10.1007\/978-3-642-14452-3_2 10.1007\/978-3-642-14452-3_2 Helena Handschuh, Geert-Jan Schrijen, and Pim Tuyls. 2010. Hardware intrinsic security from physically unclonable functions. In Towards Hardware-Intrinsic Security. Springer, 39--53. DOI:https:\/\/doi.org\/10.1007\/978-3-642-14452-3_2"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST\u201913)","author":"Helfmeier C.","year":"2013","unstructured":"C. Helfmeier , C. Boit , D. Nedospasov , and J. Seifert . 2013. Cloning physically unclonable functions . In Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST\u201913) . 1--6. DOI:https:\/\/doi.org\/10.1109\/HST. 2013 .6581556 10.1109\/HST.2013.6581556 C. Helfmeier, C. Boit, D. Nedospasov, and J. Seifert. 2013. Cloning physically unclonable functions. In Proceedings of the IEEE International Symposium on Hardware-oriented Security and Trust (HOST\u201913). 1--6. DOI:https:\/\/doi.org\/10.1109\/HST.2013.6581556"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE\u201914)","author":"Helfmeier C.","year":"2014","unstructured":"C. Helfmeier , C. Boit , D. Nedospasov , S. Tajik , and J. Seifert . 2014. Physical vulnerabilities of physically unclonable functions . In Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE\u201914) . 1--4. DOI:https:\/\/doi.org\/10.7873\/DATE. 2014 .363 10.7873\/DATE.2014.363 C. Helfmeier, C. Boit, D. Nedospasov, S. Tajik, and J. Seifert. 2014. Physical vulnerabilities of physically unclonable functions. In Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE\u201914). 1--4. DOI:https:\/\/doi.org\/10.7873\/DATE.2014.363"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS\u201912)","author":"Hospodar G.","year":"2012","unstructured":"G. Hospodar , R. Maes , and I. Verbauwhede . 2012. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability . In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS\u201912) . 37--42. DOI:https:\/\/doi.org\/10.1109\/WIFS. 2012 .6412622 10.1109\/WIFS.2012.6412622 G. Hospodar, R. Maes, and I. Verbauwhede. 2012. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS\u201912). 37--42. DOI:https:\/\/doi.org\/10.1109\/WIFS.2012.6412622"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT\u201916)","author":"Idriss T.","year":"2016","unstructured":"T. Idriss , H. Idriss , and M. Bayoumi . 2016. A PUF-based paradigm for IoT security . In Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT\u201916) . IEEE, 700--705. DOI:https:\/\/doi.org\/10.1109\/WF-IoT. 2016 .7845456 10.1109\/WF-IoT.2016.7845456 T. Idriss, H. Idriss, and M. Bayoumi. 2016. A PUF-based paradigm for IoT security. In Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT\u201916). IEEE, 700--705. DOI:https:\/\/doi.org\/10.1109\/WF-IoT.2016.7845456"},{"key":"e_1_2_1_31_1","unstructured":"Intel. 2018. PCIe* Device Security Enhancements Specifications. Retrieved from https:\/\/www.intel.com\/content\/www\/us\/en\/io\/pci-express\/pcie-device-security-enhancements-spec.html.  Intel. 2018. PCIe * Device Security Enhancements Specifications. Retrieved from https:\/\/www.intel.com\/content\/www\/us\/en\/io\/pci-express\/pcie-device-security-enhancements-spec.html."},{"key":"e_1_2_1_32_1","unstructured":"Intrinsic ID. 2019. SRAM PUF Technology. Retrieved from https:\/\/www.intrinsic-id.com\/sram-puf\/.  Intrinsic ID. 2019. SRAM PUF Technology. Retrieved from https:\/\/www.intrinsic-id.com\/sram-puf\/."},{"key":"e_1_2_1_33_1","volume-title":"Secure and reliable biometric access control for resource-constrained systems and IoT. CoRR abs\/1803.09710","author":"Karimian Nima","year":"2018","unstructured":"Nima Karimian , Zimu Guo , Fatemeh Tehranipoor , Damon L. Woodard , Mark Tehranipoor , and Domenic Forte . 2018. Secure and reliable biometric access control for resource-constrained systems and IoT. CoRR abs\/1803.09710 ( 2018 ). Nima Karimian, Zimu Guo, Fatemeh Tehranipoor, Damon L. Woodard, Mark Tehranipoor, and Domenic Forte. 2018. Secure and reliable biometric access control for resource-constrained systems and IoT. CoRR abs\/1803.09710 (2018)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2973748"},{"key":"e_1_2_1_35_1","volume-title":"Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon","author":"Katzenbeisser Stefan","unstructured":"Stefan Katzenbeisser , \u00dcnal Kocaba\u015f , Vladimir Ro\u017ei\u0107 , Ahmad-Reza Sadeghi , Ingrid Verbauwhede , and Christian Wachsmann . 2012. PUFs : Myth , Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon . Springer Berlin Heidelberg , 283--301. DOI:https:\/\/doi.org\/10.1007\/978-3-642-33027-8_17 10.1007\/978-3-642-33027-8_17 Stefan Katzenbeisser, \u00dcnal Kocaba\u015f, Vladimir Ro\u017ei\u0107, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, and Christian Wachsmann. 2012. PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. Springer Berlin Heidelberg, 283--301. DOI:https:\/\/doi.org\/10.1007\/978-3-642-33027-8_17"},{"key":"e_1_2_1_36_1","volume-title":"PUF-based software protection for low-end embedded devices","author":"Kohnh\u00e4user Florian","unstructured":"Florian Kohnh\u00e4user , Andr\u00e9 Schaller , and Stefan Katzenbeisser . 2015. PUF-based software protection for low-end embedded devices . In Trust and Trustworthy Computing, Mauro Conti, Matthias Schunter, and Ioannis Askoxylakis (Eds.). Springer International Publishing , Cham , 3--21. DOI:https:\/\/doi.org\/10.1007\/978-3-319-22846-4_1 10.1007\/978-3-319-22846-4_1 Florian Kohnh\u00e4user, Andr\u00e9 Schaller, and Stefan Katzenbeisser. 2015. PUF-based software protection for low-end embedded devices. In Trust and Trustworthy Computing, Mauro Conti, Matthias Schunter, and Ioannis Askoxylakis (Eds.). Springer International Publishing, Cham, 3--21. DOI:https:\/\/doi.org\/10.1007\/978-3-319-22846-4_1"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 1st International Conference on Data Intelligence and Security (ICDIS\u201918)","author":"Lipps C.","year":"2018","unstructured":"C. Lipps , A. Weinand , D. Krummacker , C. Fischer , and H. D. Schotten . 2018. Proof of concept for IoT device authentication based on SRAM PUFs using ATMEGA 2560-MCU . In Proceedings of the 1st International Conference on Data Intelligence and Security (ICDIS\u201918) . IEEE, 36--42. DOI:https:\/\/doi.org\/10.1109\/ICDIS. 2018 .00013 10.1109\/ICDIS.2018.00013 C. Lipps, A. Weinand, D. Krummacker, C. Fischer, and H. D. Schotten. 2018. Proof of concept for IoT device authentication based on SRAM PUFs using ATMEGA 2560-MCU. In Proceedings of the 1st International Conference on Data Intelligence and Security (ICDIS\u201918). IEEE, 36--42. DOI:https:\/\/doi.org\/10.1109\/ICDIS.2018.00013"},{"key":"#cr-split#-e_1_2_1_38_1.1","doi-asserted-by":"crossref","unstructured":"R. Maes and I. Verbauwhede. 2010. Physically unclonable functions: A study on the state of the art and future research directions. In Towards Hardware-intrinsic Security. Springer 3--37. DOI:https:\/\/doi.org\/10.1007\/978-3-642-14452-3_1 10.1007\/978-3-642-14452-3_1","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"#cr-split#-e_1_2_1_38_1.2","doi-asserted-by":"crossref","unstructured":"R. Maes and I. Verbauwhede. 2010. Physically unclonable functions: A study on the state of the art and future research directions. In Towards Hardware-intrinsic Security. Springer 3--37. DOI:https:\/\/doi.org\/10.1007\/978-3-642-14452-3_1","DOI":"10.1007\/978-3-642-14452-3_1"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 8th International Symposium on Embedded Computing and System Design (ISED\u201918)","author":"Mahalat M. H.","year":"2018","unstructured":"M. H. Mahalat , S. Saha , A. Mondal , and B. Sen . 2018. A PUF based light weight protocol for secure Wi-Fi authentication of IoT devices . In Proceedings of the 8th International Symposium on Embedded Computing and System Design (ISED\u201918) . IEEE, 183--187. DOI:https:\/\/doi.org\/10.1109\/ISED. 2018 .8703993 10.1109\/ISED.2018.8703993 M. H. Mahalat, S. Saha, A. Mondal, and B. Sen. 2018. A PUF based light weight protocol for secure Wi-Fi authentication of IoT devices. In Proceedings of the 8th International Symposium on Embedded Computing and System Design (ISED\u201918). IEEE, 183--187. DOI:https:\/\/doi.org\/10.1109\/ISED.2018.8703993"},{"key":"#cr-split#-e_1_2_1_40_1.1","doi-asserted-by":"crossref","unstructured":"Dominik Merli Dieter Schuster Frederic Stumpf and Georg Sigl. 2011. Side-channel analysis of PUFs and fuzzy extractors. In Trust and Trustworthy Computing Jonathan M. McCune Boris Balacheff Adrian Perrig Ahmad-Reza Sadeghi Angela Sasse and Yolanta Beres (Eds.). Springer Berlin Heidelberg 33--47. DOI:https:\/\/doi.org\/10.1007\/978-3-642-21599-5_3 10.1007\/978-3-642-21599-5_3","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"#cr-split#-e_1_2_1_40_1.2","doi-asserted-by":"crossref","unstructured":"Dominik Merli Dieter Schuster Frederic Stumpf and Georg Sigl. 2011. Side-channel analysis of PUFs and fuzzy extractors. In Trust and Trustworthy Computing Jonathan M. McCune Boris Balacheff Adrian Perrig Ahmad-Reza Sadeghi Angela Sasse and Yolanta Beres (Eds.). Springer Berlin Heidelberg 33--47. DOI:https:\/\/doi.org\/10.1007\/978-3-642-21599-5_3","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the Black Hat USA Conference.","author":"Miller Charlie","year":"2015","unstructured":"Charlie Miller and Chris Valasek . 2015 . Remote Exploitation of an Unaltered Passenger Vehicle . In Proceedings of the Black Hat USA Conference. Charlie Miller and Chris Valasek. 2015. Remote Exploitation of an Unaltered Passenger Vehicle. In Proceedings of the Black Hat USA Conference."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2016.2544845"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography. 30--38","author":"Nedospasov D.","year":"2013","unstructured":"D. Nedospasov , J. Seifert , C. Helfmeier , and C. Boit . 2013. Invasive PUF analysis . In Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography. 30--38 . DOI:https:\/\/doi.org\/10.1109\/FDTC. 2013 .19 10.1109\/FDTC.2013.19 D. Nedospasov, J. Seifert, C. Helfmeier, and C. Boit. 2013. Invasive PUF analysis. In Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography. 30--38. DOI:https:\/\/doi.org\/10.1109\/FDTC.2013.19"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3312614.3312650"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the Black Hat USA Conference.","author":"Nie Sen","year":"2017","unstructured":"Sen Nie , Ling Liu , and Yuefeng Du . 2017 . Free-fall: Hacking Tesla from wireless to CAN bus . In Proceedings of the Black Hat USA Conference. Sen Nie, Ling Liu, and Yuefeng Du. 2017. Free-fall: Hacking Tesla from wireless to CAN bus. In Proceedings of the Black Hat USA Conference."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_7"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI\u201916)","author":"Roelke A.","year":"2016","unstructured":"A. Roelke and M. R. Stan . 2016. Attacking an SRAM-based PUF through wearout . In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI\u201916) . 206--211. DOI:https:\/\/doi.org\/10.1109\/ISVLSI. 2016 .68 10.1109\/ISVLSI.2016.68 A. Roelke and M. R. Stan. 2016. Attacking an SRAM-based PUF through wearout. In Proceedings of the IEEE Computer Society Annual Symposium on VLSI (ISVLSI\u201916). 206--211. DOI:https:\/\/doi.org\/10.1109\/ISVLSI.2016.68"},{"key":"#cr-split#-e_1_2_1_49_1.1","doi-asserted-by":"crossref","unstructured":"Ulrich R\u00fchrmair Christian Jaeger and Michael Algasinger. 2012. An attack on PUF-based session key exchange and a hardware-based countermeasure: Erasable PUFs. In Financial Cryptography and Data Security George Danezis (Ed.). Springer Berlin 190--204. DOI:https:\/\/doi.org\/10.1007\/978-3-642-27576-0_16 10.1007\/978-3-642-27576-0_16","DOI":"10.1007\/978-3-642-27576-0_16"},{"key":"#cr-split#-e_1_2_1_49_1.2","doi-asserted-by":"crossref","unstructured":"Ulrich R\u00fchrmair Christian Jaeger and Michael Algasinger. 2012. An attack on PUF-based session key exchange and a hardware-based countermeasure: Erasable PUFs. In Financial Cryptography and Data Security George Danezis (Ed.). Springer Berlin 190--204. DOI:https:\/\/doi.org\/10.1007\/978-3-642-27576-0_16","DOI":"10.1007\/978-3-642-27576-0_16"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866335"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279798"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_24"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.08.011"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 272--282","author":"Seshadri A.","year":"2004","unstructured":"A. Seshadri , A. Perrig , L. van Doorn , and P. Khosla . 2004. SWATT: Software-based attestation for embedded devices . In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 272--282 . DOI:https:\/\/doi.org\/10.1109\/SECPRI. 2004 .1301329 10.1109\/SECPRI.2004.1301329 A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. 2004. SWATT: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 272--282. DOI:https:\/\/doi.org\/10.1109\/SECPRI.2004.1301329"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264492.3264494"},{"key":"e_1_2_1_57_1","volume-title":"Talon Tools: The Framework for Practical IEEE 802.11ad Research.","author":"Steinmetzer Daniel","year":"2017","unstructured":"Daniel Steinmetzer , Daniel Wegemer , and Matthias Hollick . 2017 . Talon Tools: The Framework for Practical IEEE 802.11ad Research. Retrieved from https:\/\/seemoo.de\/talon-tools. Daniel Steinmetzer, Daniel Wegemer, and Matthias Hollick. 2017. Talon Tools: The Framework for Practical IEEE 802.11ad Research. Retrieved from https:\/\/seemoo.de\/talon-tools."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143384"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212499"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9228-6"},{"key":"e_1_2_1_61_1","volume-title":"Towards implementation of robust and low-cost security primitives for resource-constrained IoT devices. CoRR abs\/1806.05332","author":"Tehranipoor Fatemeh","year":"2018","unstructured":"Fatemeh Tehranipoor . 2018. Towards implementation of robust and low-cost security primitives for resource-constrained IoT devices. CoRR abs\/1806.05332 ( 2018 ). Fatemeh Tehranipoor. 2018. Towards implementation of robust and low-cost security primitives for resource-constrained IoT devices. CoRR abs\/1806.05332 (2018)."},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI\u201917)","author":"Tehranipoor Fatemeh","unstructured":"Fatemeh Tehranipoor , Nima Karimian , Paul A. Wortman , and John A. Chandy . 2017. Investigation of the Internet of Things in its application to low-cost authentication within healthcare . In Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI\u201917) . Fatemeh Tehranipoor, Nima Karimian, Paul A. Wortman, and John A. Chandy. 2017. Investigation of the Internet of Things in its application to low-cost authentication within healthcare. In Proceedings of the IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI\u201917)."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201918)","author":"Tehranipoor F.","year":"2018","unstructured":"F. Tehranipoor , N. Karimian , P. A. Wortman , and J. A. Chandy . 2018. Low-cost authentication paradigm for consumer electronics within the Internet of wearable fitness tracking applications . In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201918) . IEEE, 1--6. DOI:https:\/\/doi.org\/10.1109\/ICCE. 2018 .8326233 10.1109\/ICCE.2018.8326233 F. Tehranipoor, N. Karimian, P. A. Wortman, and J. A. Chandy. 2018. Low-cost authentication paradigm for consumer electronics within the Internet of wearable fitness tracking applications. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE\u201918). IEEE, 1--6. DOI:https:\/\/doi.org\/10.1109\/ICCE.2018.8326233"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.136"},{"key":"#cr-split#-e_1_2_1_65_1.1","doi-asserted-by":"crossref","unstructured":"Anthony Van Herrewege Stefan Katzenbeisser Roel Maes Roel Peeters Ahmad-Reza Sadeghi Ingrid Verbauwhede and Christian Wachsmann. 2012. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. In Financial Cryptography and Data Security Angelos D. Keromytis (Ed.). Springer Berlin 374--389. DOI:https:\/\/doi.org\/10.1007\/978-3-642-32946-3_27 10.1007\/978-3-642-32946-3_27","DOI":"10.1007\/978-3-642-32946-3_27"},{"key":"#cr-split#-e_1_2_1_65_1.2","doi-asserted-by":"crossref","unstructured":"Anthony Van Herrewege Stefan Katzenbeisser Roel Maes Roel Peeters Ahmad-Reza Sadeghi Ingrid Verbauwhede and Christian Wachsmann. 2012. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. In Financial Cryptography and Data Security Angelos D. Keromytis (Ed.). Springer Berlin 374--389. DOI:https:\/\/doi.org\/10.1007\/978-3-642-32946-3_27","DOI":"10.1007\/978-3-642-32946-3_27"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.22"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the IEEE EMBS International Conference on Biomedical Health Informatics (BHI\u201917)","author":"Wortman P. A.","year":"2017","unstructured":"P. A. Wortman , F. Tehranipoor , N. Karimian , and J. A. Chandy . 2017. Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain . In Proceedings of the IEEE EMBS International Conference on Biomedical Health Informatics (BHI\u201917) . IEEE, 185--188. DOI:https:\/\/doi.org\/10.1109\/BHI. 2017 .7897236 10.1109\/BHI.2017.7897236 P. A. Wortman, F. Tehranipoor, N. Karimian, and J. A. Chandy. 2017. Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain. In Proceedings of the IEEE EMBS International Conference on Biomedical Health Informatics (BHI\u201917). IEEE, 185--188. DOI:https:\/\/doi.org\/10.1109\/BHI.2017.7897236"},{"key":"e_1_2_1_68_1","volume-title":"Proceedings of the Conference on Design, Automation 8 Test in Europe (DATE\u201914)","author":"Xu Xiaolin","year":"2014","unstructured":"Xiaolin Xu and Wayne Burleson . 2014 . Hybrid side-channel\/machine-learning attacks on PUFs: A new threat? In Proceedings of the Conference on Design, Automation 8 Test in Europe (DATE\u201914) . European Design and Automation Association. Retrieved from http:\/\/dl.acm.org\/citation.cfm?id=2616606.2617100. Xiaolin Xu and Wayne Burleson. 2014. Hybrid side-channel\/machine-learning attacks on PUFs: A new threat? In Proceedings of the Conference on Design, Automation 8 Test in Europe (DATE\u201914). European Design and Automation Association. Retrieved from http:\/\/dl.acm.org\/citation.cfm?id=2616606.2617100."},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the 27th International Conference on Field Programmable Logic and Applications (FPL\u201917)","author":"Yan W.","year":"2017","unstructured":"W. Yan , C. Jin , F. Tehranipoor , and J. A. Chandy . 2017. Phase calibrated ring oscillator PUF design and implementation on FPGAs . In Proceedings of the 27th International Conference on Field Programmable Logic and Applications (FPL\u201917) . IEEE, 1--8. DOI:https:\/\/doi.org\/10.23919\/FPL. 2017 .8056859 10.23919\/FPL.2017.8056859 W. Yan, C. Jin, F. Tehranipoor, and J. A. Chandy. 2017. Phase calibrated ring oscillator PUF design and implementation on FPGAs. In Proceedings of the 27th International Conference on Field Programmable Logic and Applications (FPL\u201917). IEEE, 1--8. DOI:https:\/\/doi.org\/10.23919\/FPL.2017.8056859"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512534"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3406280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3406280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:52Z","timestamp":1750195912000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3406280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,31]]},"references-count":73,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,8,31]]}},"alternative-id":["10.1145\/3406280"],"URL":"https:\/\/doi.org\/10.1145\/3406280","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,31]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}