{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:44:14Z","timestamp":1763102654026,"version":"3.45.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061069","type":"journal-article","created":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T02:46:16Z","timestamp":1741142776000},"page":"1307-1325","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Root Security Parameter Generation Mechanism Based on SRAM PUF for Smart Terminals in Power IoT"],"prefix":"10.32604","volume":"83","author":[{"given":"Xiao","family":"Feng","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Xiaokang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yonggui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"4084","DOI":"10.1109\/JIOT.2019.2959124","article-title":"Trust-oriented IoT service placement for smart cities in edge computing","volume":"7","author":"Xu","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"6010","DOI":"10.1109\/JIOT.2019.2951593","article-title":"Trusted cloud-edge network resource management: DRL-driven service function chain orchestration for IoT","volume":"7","author":"Guo","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"102167","DOI":"10.1016\/j.sysarc.2021.102167","article-title":"Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing","volume":"118","author":"Kuang","year":"2021","journal-title":"J Syst Archit"},{"key":"ref4","series-title":"Proceedings of IEEE INFOCOM Conference on Computer Communications","first-page":"2467","article-title":"Wireless and computing resource allocation for selfish computation offloading in edge computing","author":"Josilo","year":"2019 Apr 29\u2013May 2"},{"journal-title":"NIST Interagency Report 7628 Revision 1","article-title":"Guidelines for Smart Grid Cybersecurity","year":"2014","key":"ref5"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"3164","DOI":"10.1109\/TSG.2022.3231563","article-title":"Mitigating load-altering attacks against power grids using cyber-resilient economic dispatch","volume":"14","author":"Chu","year":"2023","journal-title":"IEEE Trans Smart Grid"},{"key":"ref7","unstructured":"Ivest RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms. [cited 2025 Jan 10]. Available from: https:\/\/luca-giuzzi.unibs.it\/corsi\/Support\/papers-cryptography\/RAD78.pdf."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3479","DOI":"10.1007\/s11276-023-03422-5","article-title":"Physical layer security for IoT over Nakagami-m and mixed Rayleigh-Nakagami-m fading channels","volume":"29","author":"Devi","year":"2023","journal-title":"Wirel Netw"},{"key":"ref9","first-page":"2121","article-title":"AID4I: an intrusion detection framework for industrial Internet of Things using automated machine learning","volume":"76","author":"Sezgin","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref10","series-title":"Anais do XLI Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos (SBRC 2023)","article-title":"A federated learning approach for authentication and user identification based on behavioral biometrics","author":"Veiga","year":"2023 May 22\u201326"},{"key":"ref11","series-title":"Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop","first-page":"63","article-title":"FPGA intrinsic PUFs and their use for IP protection","author":"Guajardo","year":"2007 Sep 10\u201313"},{"key":"ref12","series-title":"2015 IEEE International Symposium on Hardware-Oriented Security and Trust","first-page":"517","article-title":"Secure key generation from biased PUFs","author":"Maes","year":"2015 Sep 13\u201316"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","article-title":"Physical unclonable functions and applications: a tutorial","volume":"102","author":"Herder","year":"2014","journal-title":"Proc IEEE"},{"key":"ref14","series-title":"2014 Design, Automation & Test in Europe Conference & Exhibition","first-page":"1","article-title":"PUF modeling attacks: an introduction and overview","author":"Ruhrmair","year":"2014 Mar 24\u201328"},{"key":"ref15","series-title":"Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust","article-title":"RPUF: physical unclonable function with randomized challenge to resist modeling attack","author":"Ye","year":"2016 Dec 19\u201320"},{"key":"ref16","series-title":"2016 IEEE Symposium on VLSI Circuits","article-title":"A machine-learning classifier implemented in a standard 6T SRAM array","author":"Zhang","year":"2016 Jun 15\u201317"},{"key":"ref17","series-title":"2016 IEEE International Symposium on Hardware Oriented","article-title":"Machine learning resistant strong PUF: possible or a pipe dream","author":"Vijayakumar","year":"2016 May 3\u20135"},{"key":"ref18","series-title":"2017 Symposium on VLSI Circuits","article-title":"A sequence dependent challenge-response PUF using 28nm SRAM 6T bit cell","author":"Jeloka","year":"2017 Jun 5\u20138"},{"key":"ref19","series-title":"2018 IEEE International Symposium on Hardware Oriented","article-title":"Delay model and machine learning exploration of a hardware-embedded delay PUF","author":"Che","year":"2018 Apr 30\u2013May 4"},{"key":"ref20","series-title":"NAECON 2018-IEEE National Aerospace and Electronics","article-title":"Machine learning based modeling attacks on a configurable PUF","author":"Kumar","year":"2018 Jul 23\u201326"},{"journal-title":"IACR Cryptol Eprint Arch Report 2019\/862","article-title":"Breaking the lightweight secure PUF: understanding the relation of input transformations and machine learning resistance","author":"Wisiol","key":"ref21"},{"key":"ref22","series-title":"2020 Third ISEA Conference on Security and Privacy","article-title":"2SPUF: machine learning attack resistant SRAM PUF","author":"Rai","year":"2020 Feb 27\u2013Mar 1"},{"key":"ref23","first-page":"564","article-title":"Solar particle event and single event upset prediction from SRAM-based monitor and supervised machine learning","volume":"10","author":"Chen","year":"2022","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"ref24","series-title":"2022 IEEE International Symposium on Hardware Oriented","article-title":"Identification and classification of corrupted PUF responses via machine learning","author":"Suragani","year":"2022 Jun 27\u201330"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1109\/TCAD.2022.3197499","article-title":"RBNN: memory-efficient reconfigurable deep binary neural network with IP protection for Internet of Things","volume":"42","author":"Qiu","year":"2023","journal-title":"IEEE Trans Comput-Aided Des Integr Circuits Syst"},{"key":"ref26","first-page":"345","article-title":"Performance evaluation of SRAM-PUF based on 7-nm, 10-nm and 14-nm FinFET technology nodes","volume":"14","author":"Mispan","year":"2023","journal-title":"Int J Nanoelectron Mater"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.3390\/electronics10121479","article-title":"Estimation during design phases of suitable SRAM cells for PUF applications using separatrix and mismatch metrics","volume":"10","author":"Alheyasat","year":"2021","journal-title":"Electronics"},{"key":"ref28","unstructured":"Huada Semiconductor Co., Ltd. Huada Semiconductor\u2019s Subsidiary Xiaohua Semiconductor Awarded \u201cBest MCU Chip of 2023\u201d. [cited 2025 Jan 10]. Available from: https:\/\/www.hdsc.com.cn\/108.html."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_61069\/TSP_CMC_61069.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:26Z","timestamp":1763102366000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061069","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-07","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}