{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:44:17Z","timestamp":1753519457890,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,23]]},"DOI":"10.1145\/3587828.3587865","type":"proceedings-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T15:40:57Z","timestamp":1687275657000},"page":"246-252","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Unique PUF Authentication Protocol Based Fuzzy Logic Categorization for Internet of Things (IOT) Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2602-4862","authenticated-orcid":false,"given":"Jameel Shehu","family":"Yalli","sequence":"first","affiliation":[{"name":"Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4065-3968","authenticated-orcid":false,"given":"Mohd Hilmi","family":"Hasan","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, Universiti Teknologi PETRONAS, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Data Trustworthiness in Internet of Things: A Taxonomy and Future Directions. IEEE Conference on Big Data and Analytics (ICBDA).","author":"Haron Nazleeni S.","year":"2017","unstructured":"Nazleeni S. Haron , Jafreezal Jaafar , Izzatdin Abdulaziz , and Mohd Hilmi Hassan . 2017 . Data Trustworthiness in Internet of Things: A Taxonomy and Future Directions. IEEE Conference on Big Data and Analytics (ICBDA). Nazleeni S. Haron, Jafreezal Jaafar, Izzatdin Abdulaziz, and Mohd Hilmi Hassan. 2017. Data Trustworthiness in Internet of Things: A Taxonomy and Future Directions. IEEE Conference on Big Data and Analytics (ICBDA)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.035"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5853"},{"key":"e_1_3_2_1_4_1","volume-title":"Somani","author":"Tawalbeh Loai A.","year":"2016","unstructured":"Loai A. Tawalbeh and Turki F . Somani . 2016 . More Secure Internet of Things Using Robust Encryption Algorithms Against Side Channel Attacks. IEEE Xplore, 978-1-5090-4320-0\/16\/$31.00 \u00a9 IEEE Loai A. Tawalbeh and Turki F. Somani. 2016. More Secure Internet of Things Using Robust Encryption Algorithms Against Side Channel Attacks. IEEE Xplore, 978-1-5090-4320-0\/16\/$31.00 \u00a9 IEEE"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218253"},{"key":"e_1_3_2_1_6_1","volume-title":"Muddesar Iqbal and Gunasekaran. Raja","author":"Ali Amjad","year":"2020","unstructured":"Amjad Ali , Li Feng , Ali K. Bashir , Shaker El-Sappagh , Syed H. Ahmed , Muddesar Iqbal and Gunasekaran. Raja . 2020 . Quality of Service Provisioning for Heterogeneous Services in Cognitive Radio-Enabled Internet of Things. IEEE TRANS NET SCI & ENGR Amjad Ali, Li Feng, Ali K. Bashir, Shaker El-Sappagh, Syed H. Ahmed, Muddesar Iqbal and Gunasekaran. Raja. 2020. Quality of Service Provisioning for Heterogeneous Services in Cognitive Radio-Enabled Internet of Things. IEEE TRANS NET SCI & ENGR"},{"key":"e_1_3_2_1_7_1","article-title":"Modeling and Analysis of the Impact of Adaptive Defense Strategy on Virus Spreading","volume":"48","author":"Zhu Qingyi","year":"2018","unstructured":"Qingyi Zhu , Longqi Li and Chenquan Ghan . 2018 . Modeling and Analysis of the Impact of Adaptive Defense Strategy on Virus Spreading . IAENG International Journal of Applied Mathematics , 48 :2, IJAM_48_2_07 Qingyi Zhu, Longqi Li and Chenquan Ghan. 2018. Modeling and Analysis of the Impact of Adaptive Defense Strategy on Virus Spreading. IAENG International Journal of Applied Mathematics, 48:2, IJAM_48_2_07","journal-title":"IAENG International Journal of Applied Mathematics"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"volume-title":"Pim Tuyls and Ingrid Verbauwhede.2009. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs","author":"Maes Roel","key":"e_1_3_2_1_9_1","unstructured":"Roel Maes , Pim Tuyls and Ingrid Verbauwhede.2009. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs . International Association for Cryptologic Research . Roel Maes, Pim Tuyls and Ingrid Verbauwhede.2009. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs. International Association for Cryptologic Research."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2014.2370531"},{"volume-title":"Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Com.","author":"Pellicer Soledad","key":"e_1_3_2_1_11_1","unstructured":"Soledad Pellicer , Guadalupe Santa , Andres L. Bleda , Rafael Maestre , Antonio J. Jara , and Antonio G. Skarmeta . 2013. A Global Perspective of Smart Cities: A Survey . Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Com. Soledad Pellicer, Guadalupe Santa, Andres L. Bleda, Rafael Maestre, Antonio J. Jara, and Antonio G. Skarmeta. 2013. A Global Perspective of Smart Cities: A Survey. Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Com."},{"key":"e_1_3_2_1_12_1","volume-title":"C Rodrigues and Youngho Park","author":"Banerjee Soumya","year":"2019","unstructured":"Soumya Banerjee , Vanga Odelu , Ashok K. Das , Samiran Chattopadhyay , Joel J. P. C Rodrigues and Youngho Park . 2019 . Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions. IEE Access . Soumya Banerjee, Vanga Odelu, Ashok K. Das, Samiran Chattopadhyay, Joel J. P. C Rodrigues and Youngho Park. 2019. Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions. IEE Access."},{"key":"e_1_3_2_1_13_1","article-title":"A Fuzzy Logic Model for Secure Routing in Smart Grid Networks. IEEE Access. Multidisciplinary, Rapid Review","volume":"10","author":"Alnaseer Aljawharah","year":"2017","unstructured":"Aljawharah Alnaseer and Hongjian Sun . 2017 . A Fuzzy Logic Model for Secure Routing in Smart Grid Networks. IEEE Access. Multidisciplinary, Rapid Review , Open Access Journal. DOI 10 .1109\/ACCESS 2017.2740219. Aljawharah Alnaseer and Hongjian Sun. 2017. A Fuzzy Logic Model for Secure Routing in Smart Grid Networks. IEEE Access. Multidisciplinary, Rapid Review, Open Access Journal. DOI 10.1109\/ACCESS 2017.2740219.","journal-title":"Open Access Journal. DOI"},{"key":"e_1_3_2_1_15_1","volume-title":"Dijk and Srinivas Devadas","author":"Gassend Blaise","year":"2002","unstructured":"Blaise Gassend , Dwaine Clark , Marten V. Dijk and Srinivas Devadas . 2002 . Silicon Physical Random Functions. Massachusetts Institute of Technology , Laboratory for Computer Science, November 18\u201322, 2002, Washington, DC, USA. Blaise Gassend, Dwaine Clark, Marten V. Dijk and Srinivas Devadas. 2002. Silicon Physical Random Functions. Massachusetts Institute of Technology, Laboratory for Computer Science, November 18\u201322, 2002, Washington, DC, USA."},{"key":"e_1_3_2_1_16_1","unstructured":"Marco Gercke. 2012. Understanding cybercrime: phenomena challenges and legal response. Book. The ITU Publication.  Marco Gercke. 2012. Understanding cybercrime: phenomena challenges and legal response. Book. The ITU Publication."},{"key":"e_1_3_2_1_17_1","article-title":"Security framework for dynamic service-oriented IT systems","author":"Kolaczek Grzegorz","year":"2018","unstructured":"Grzegorz Kolaczek and Jolanta M. Pietraszko . 2018 . Security framework for dynamic service-oriented IT systems . Journal of Info & Telecomm. Grzegorz Kolaczek and Jolanta M. Pietraszko. 2018. Security framework for dynamic service-oriented IT systems. Journal of Info & Telecomm.","journal-title":"Journal of Info & Telecomm."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19143208"},{"key":"e_1_3_2_1_19_1","volume-title":"Nadiia Morhun and Oleg Gushchyn","author":"Kofanova Olena","year":"2019","unstructured":"Olena Kofanova , Yuliia Tereshchenko , Roman Kutsyi , Nadiia Morhun and Oleg Gushchyn . 2019 . Actual situation of computer crime in the credit and financial sphere of Ukraine, modern aspect. Consulting Publishing Company Business Perspectives , Banks and Systems Olena Kofanova, Yuliia Tereshchenko, Roman Kutsyi, Nadiia Morhun and Oleg Gushchyn. 2019. Actual situation of computer crime in the credit and financial sphere of Ukraine, modern aspect. Consulting Publishing Company Business Perspectives, Banks and Systems"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080352"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2018.01.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/info8040136"},{"key":"e_1_3_2_1_23_1","volume-title":"UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. Computers and Security","author":"Das Ayan K.","year":"2020","unstructured":"Ayan K. Das , Sidra Kalam , Nausheen Sahar , and Ditipriya Sinha . 2020 . UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. Computers and Security , Elsevier . Ayan K. Das, Sidra Kalam, Nausheen Sahar, and Ditipriya Sinha. 2020. UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. Computers and Security, Elsevier."},{"volume-title":"Design of a Piezoelectric-Based Physically Unclonable Function for IoT Security","author":"Labrado Carson","key":"e_1_3_2_1_24_1","unstructured":"Carson Labrado and Himanshu Thapliyal . 2019. Design of a Piezoelectric-Based Physically Unclonable Function for IoT Security . IEEE Carson Labrado and Himanshu Thapliyal. 2019. Design of a Piezoelectric-Based Physically Unclonable Function for IoT Security. IEEE"},{"key":"e_1_3_2_1_25_1","unstructured":"Hongxiang Gu and Miordrag Potkonjak. 2021. Evolution-Strategies-Driven Optimization on Secure and Reconfigurable Interconnection PUF Networks. https:\/\/www.mdpi.com\/journal\/electronics Electronics.  Hongxiang Gu and Miordrag Potkonjak. 2021. Evolution-Strategies-Driven Optimization on Secure and Reconfigurable Interconnection PUF Networks. https:\/\/www.mdpi.com\/journal\/electronics Electronics."},{"key":"e_1_3_2_1_26_1","volume-title":"Sangaiah","author":"Mahmood Khalid","year":"2018","unstructured":"Khalid Mahmood , Shehzad A. Chaudhry , Husnain Naqvi , Saru Kumari , Xiong Li , and Arun K . Sangaiah . 2018 . An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems . Khalid Mahmood, Shehzad A. Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, and Arun K. Sangaiah. 2018. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Generation Computer Systems."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Abbasinezhad M. Dariush. and Morteza Nikooghadam. 2018. Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Generation Computer Systems.  Abbasinezhad M. Dariush. and Morteza Nikooghadam. 2018. Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Generation Computer Systems.","DOI":"10.1016\/j.future.2018.02.034"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898376"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2013.6617083"},{"volume-title":"Towards an Automatic Evaluation of the Performance of PUF","author":"Zerrouki Fahem","key":"e_1_3_2_1_30_1","unstructured":"Fahem Zerrouki , Samir Ouchani & Hafida Bouarfa . 2020. Towards an Automatic Evaluation of the Performance of PUF . Springer . Fahem Zerrouki, Samir Ouchani & Hafida Bouarfa. 2020. Towards an Automatic Evaluation of the Performance of PUF. Springer."}],"event":{"name":"ICSCA 2023: 2023 12th International Conference on Software and Computer Applications","acronym":"ICSCA 2023","location":"Kuantan Malaysia"},"container-title":["Proceedings of the 2023 12th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587828.3587865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:28Z","timestamp":1750183708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":29,"alternative-id":["10.1145\/3587828.3587865","10.1145\/3587828"],"URL":"https:\/\/doi.org\/10.1145\/3587828.3587865","relation":{},"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"2023-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}