{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:10:04Z","timestamp":1750191004464,"version":"3.41.0"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T00:00:00Z","timestamp":1647302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Aerospace Network Research Consortium","award":["BOCO-0018"],"award-info":[{"award-number":["BOCO-0018"]}]},{"name":"Department of Science and Technology","award":["SP\/DSTO-19-0054"],"award-info":[{"award-number":["SP\/DSTO-19-0054"]}]},{"name":"UKIERI-DST","award":["UKIERI2018-19-005"],"award-info":[{"award-number":["UKIERI2018-19-005"]}]},{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"crossref","award":["EP\/11288S170484-102"],"award-info":[{"award-number":["EP\/11288S170484-102"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NPL\u2019s Data Science program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"<jats:p>\n            The traceability of components on a supply chain from a production facility to deployment and maintenance depends upon its irrefutable identity. There are two well-known identification methods: an identity code stored in the memory and embedding custom identification hardware. While storing the identity code is susceptible to malicious and unintentional attacks, the approach of embedding a custom identification hardware is infeasible for sensor nodes assembled with Commercially-Off-the-Shelf devices. We propose a novel identifier -\n            <jats:monospace>Acoustic PUF<\/jats:monospace>\n            based on the innate properties of the sensor node.\n            <jats:monospace>Acoustic PUF<\/jats:monospace>\n            combines the uniqueness component and the position component of the sensor device signature. The uniqueness component is derived by exploiting the manufacturing tolerances, thus making the signature unclonable. The position component is derived through acoustic fingerprinting, thus giving a sticky identity to the sensor device. We evaluate\n            <jats:monospace>Acoustic PUF<\/jats:monospace>\n            for Uniqueness, Repeatability, and Position identity with a deployment spanning several weeks. Through our experimental evaluation and further numerical analysis, we prove that\n            <jats:monospace>Acoustic PUF<\/jats:monospace>\n            can uniquely identify thousands of devices with 99% accuracy while simultaneously detecting the change in position. We use the physical position of a device within a synthetic sound-field both as an identity measure as well as to validate physical integrity of the device.\n          <\/jats:p>","DOI":"10.1145\/3488306","type":"journal-article","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T16:03:24Z","timestamp":1632499404000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Sensor Identification via Acoustic Physically Unclonable Function"],"prefix":"10.1145","volume":"4","author":[{"given":"Girish","family":"Vaidya","sequence":"first","affiliation":[{"name":"Indian Institute of Science, India"}]},{"given":"T. V.","family":"Prabhakar","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, India"}]},{"given":"Nithish","family":"Gnani","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, India"}]},{"given":"Ryan","family":"Shah","sequence":"additional","affiliation":[{"name":"University of Strathclyde, UK"}]},{"given":"Shishir","family":"Nagaraja","sequence":"additional","affiliation":[{"name":"University of Strathclyde, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/NGCAS.2017.66"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTAIS.2018.8600824"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.susmat.2020.e00195"},{"key":"e_1_3_1_5_2","unstructured":"Aircraft Electronics Association. 2019. AEA Unveils Third-quarter 2019 Avionics Market Report. Retrieved from https:\/\/aea.net\/newsitem.asp?ID=2965."},{"key":"e_1_3_1_6_2","unstructured":"Rameshkumar Balasubramanian. 2017. Aircraft overhead bin monitoring and alert system. (Aug. 292017). US Patent 9 745 064."},{"volume-title":"Why Calibrate? Reasons for Calibration","key":"e_1_3_1_7_2","unstructured":"Beamex. Why Calibrate? Reasons for Calibration. Technical Report. Retrieved from http:\/\/cdn2.hubspot.net\/hubfs\/2203666\/Beamex_White_Papers\/Beamex_White_Paper_-_Why_calibrate_-Reason_for_calibration_ENG.pdf."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2015.150012"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2016.7870009"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3956282"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54669-8_4"},{"volume-title":"PSoC 63 with BLE Architecture Technical Reference Manual, Document No. 002-18176","year":"2018","key":"e_1_3_1_12_2","unstructured":"Cypress semiconductors 2018. PSoC 63 with BLE Architecture Technical Reference Manual, Document No. 002-18176."},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660325"},{"key":"e_1_3_1_14_2","unstructured":"Analog Devices. 2020. LTspice. Retrieved December 2019 from https:\/\/www.analog.com\/en\/design-center\/design-tools-and-calculators\/ltspice-simulator.html."},{"key":"e_1_3_1_15_2","unstructured":"Analog Devices. 2020. LTspice: Worst-Case Circuit Analysis with Minimal Simulations Runs. Retrieved from https:\/\/www.analog.com\/en\/technical-articles\/ltspice-worst-case-circuit-analysis-with-minimal-simulations-runs.html."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/IMS3TW.2017.7995207"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383915"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-008045157-2\/50114-0"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2439278"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/WASPAA.2013.6701810"},{"key":"e_1_3_1_21_2","first-page":"01","volume-title":"Proceedings of the Conference on RFID Security","volume":"7","author":"Holcomb Daniel E.","year":"2007","unstructured":"Daniel E. Holcomb, Wayne P. Burleson, Kevin Fu, et\u00a0al. 2007. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In Proceedings of the Conference on RFID Security, Vol. 7. 01."},{"volume-title":"Invensense 40618-v1.0 Datasheet","year":"2016","key":"e_1_3_1_22_2","unstructured":"Invensense. 2016. Invensense 40618-v1.0 Datasheet. Invensense."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2015.2490261"},{"key":"e_1_3_1_24_2","first-page":"1935","volume-title":"Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research)","volume":"70","author":"Kumar Ashish","year":"2017","unstructured":"Ashish Kumar, Saurabh Goyal, and Manik Varma. 2017. Resource-efficient machine learning in 2 KB RAM for the internet of things. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research), Doina Precup and Yee Whye Teh (Eds.), Vol. 70. PMLR, 1935\u20131944."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2702607"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_3_1_28_2","unstructured":"Microchip. Vectron Product Portfolio. Retrieved February 2021 from https:\/\/www.vectron.com\/products\/crystals\/precision_crystals_index.htm."},{"key":"e_1_3_1_29_2","unstructured":"Microchip. VT-803 Temperature Compensated Crystal Oscillator. Retrieved February 2021 from https:\/\/www.vectron.com\/products\/tcxo\/vt-803.pdf."},{"key":"e_1_3_1_30_2","unstructured":"Microchip. XR-U Crystal Resonator. Retrieved February 2021 from https:\/\/www.vectron.com\/products\/hitemp\/XR-U_HC37_TO8_Release_1.pdf."},{"key":"e_1_3_1_31_2","first-page":"2177","volume-title":"Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS\u201917)","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS\u201917). IEEE, 2177\u20132184."},{"key":"e_1_3_1_32_2","unstructured":"Nordic Semiconductors 2017. nRF52832\u2014Product Specification v1.0 . Retrieved December 2019 from https:\/\/infocenter.nordicsemi.com\/pdf\/nRF52832_PS_v1.0.pdf."},{"key":"e_1_3_1_33_2","unstructured":"Nordic Semiconductors 2019. nRF52840\u2014Product Specification v1.1 . Retrieved January 2020 from https:\/\/infocenter.nordicsemi.com\/pdf\/nRF52840_PS_v1.1.pdf."},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.262"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2004.838540"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jhh.1001241"},{"key":"e_1_3_1_37_2","first-page":"1","volume-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE\u201914)","author":"R\u00fchrmair Ulrich","year":"2014","unstructured":"Ulrich R\u00fchrmair and Daniel E. Holcomb. 2014. PUFs at a glance. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE\u201914). IEEE, Dresden, Germany, 1\u20136."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1097\/00061198-200506000-00009"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.37"},{"key":"e_1_3_1_40_2","unstructured":"Nordic Semiconductors. nRF52 DK. Retrieved December 2019 from https:\/\/www.nordicsemi.com\/Software-and-Tools\/Development-Kits\/nRF52-DK."},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2798591"},{"key":"e_1_3_1_42_2","unstructured":"Richard K. Simms Stephen G. Dame Mark L. Cloud and Todd D. Smith. 2020. Vehicle stowage bin assemblies having weight sensors. (May 122020). US Patent 10 647 429."},{"key":"e_1_3_1_43_2","first-page":"9","volume-title":"Proceedings of the 44th ACM\/IEEE Design Automation Conference (DAC\u201907)","author":"Suh G. Edward","year":"2007","unstructured":"G. Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th ACM\/IEEE Design Automation Conference (DAC\u201907). IEEE, 9\u201314."},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1088\/0957-0233\/25\/10\/105304"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2606658"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.7906898"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2939757"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/IoTDI49375.2020.00026"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2498130"},{"key":"e_1_3_1_50_2","unstructured":"Wikipedia. Concept Drift. Retrieved February 2021 from https:\/\/en.wikipedia.org\/wiki\/Concept_drift."},{"key":"e_1_3_1_51_2","unstructured":"Wikipedia. Incremental (Online) Learning with Scikit-Multiflow. Retrieved February 2021 from https:\/\/towardsdatascience.com\/incremental-online-learning-with-scikit-multiflow-6b846913a50b."},{"key":"e_1_3_1_52_2","unstructured":"Wikipedia. 2019. Ring Oscillator. Retrieved January 2020 from https:\/\/en.wikipedia.org\/wiki\/Ring_oscillator\/."},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660300"}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:24Z","timestamp":1750188624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,15]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3488306"],"URL":"https:\/\/doi.org\/10.1145\/3488306","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"type":"print","value":"2692-1626"},{"type":"electronic","value":"2576-5337"}],"subject":[],"published":{"date-parts":[[2022,3,15]]},"assertion":[{"value":"2020-08-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}