{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:38:18Z","timestamp":1760236698919,"version":"build-2065373602"},"reference-count":70,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T00:00:00Z","timestamp":1639612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003032","name":"Association Nationale de la Recherche et de la Technologie","doi-asserted-by":"publisher","award":["2018\/1810"],"award-info":[{"award-number":["2018\/1810"]}],"id":[{"id":"10.13039\/501100003032","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The demand for Internet of Things services is increasing exponentially, and consequently a large number of devices are being deployed. To efficiently authenticate these objects, the use of physical unclonable functions (PUFs) has been introduced as a promising solution for the resource-constrained nature of these devices. The use of machine learning PUF models has been recently proposed to authenticate the IoT objects while reducing the storage space requirement for each device. Nonetheless, the use of a mathematically clonable PUFs requires careful design of the enrollment process. Furthermore, the secrecy of the machine learning models used for PUFs and the scenario of leakage of sensitive information to an adversary due to an insider threat within the organization have not been discussed. In this paper, we review the state-of-the-art model-based PUF enrollment protocols. We identity two architectures of enrollment protocols based on the participating entities and the building blocks that are relevant to the security of the authentication procedure. In addition, we discuss their respective weaknesses with respect to insider and outsider threats. Our work serves as a comprehensive overview of the ML PUF-based methods and provides design guidelines for future enrollment protocol designers.<\/jats:p>","DOI":"10.3390\/s21248415","type":"journal-article","created":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T21:32:40Z","timestamp":1639690360000},"page":"8415","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9259-7785","authenticated-orcid":false,"given":"Sameh","family":"Khalfaoui","sequence":"first","affiliation":[{"name":"EDF R&D, 7 Boulevard Gaspard Monge, 91120 Palaiseau, France"},{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, 19 Place Marguerite Perey, 91120 Palaiseau, France"}]},{"given":"Jean","family":"Leneutre","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, 19 Place Marguerite Perey, 91120 Palaiseau, France"}]},{"given":"Arthur","family":"Villard","sequence":"additional","affiliation":[{"name":"EDF R&D, 7 Boulevard Gaspard Monge, 91120 Palaiseau, France"}]},{"given":"Ivan","family":"Gazeau","sequence":"additional","affiliation":[{"name":"EDF R&D, 7 Boulevard Gaspard Monge, 91120 Palaiseau, France"}]},{"given":"Jingxuan","family":"Ma","sequence":"additional","affiliation":[{"name":"EDF R&D, 7 Boulevard Gaspard Monge, 91120 Palaiseau, France"}]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[{"name":"LTCI, T\u00e9l\u00e9com Paris, Institut Polytechnique de Paris, 19 Place Marguerite Perey, 91120 Palaiseau, France"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.bushor.2018.08.002","article-title":"The Internet of Things (IoT) in retail: Bridging supply and demand","volume":"62","author":"Caro","year":"2019","journal-title":"Bus. Horizons"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Fagan, M., Fagan, M., Megas, K.N., Scarfone, K., and Smith, M. (2020). IoT Device Cybersecurity Capability Core Baseline, US Department of Commerce, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8259a"},{"key":"ref_3","unstructured":"(2020). Cyber Security for Consumer Internet of Things: Baseline Requirements, European Telecommunications Standards Institute. Standard ETSI EN 303 645 v2.1.1."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Guin, U., Singh, A., Alam, M., Ca\u00f1edo, J., and Skjellum, A. (2018). A Secure Low-Cost Edge Device Authentication Scheme for the Internet of Things, IEEE.","DOI":"10.1109\/VLSID.2018.42"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Hummen, R., Ziegeldorf, J.H., Shafagh, H., Raza, S., and Wehrle, K. (2013, January 19). Towards Viable Certificate-Based Authentication for the Internet of Things. Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary.","DOI":"10.1145\/2463183.2463193"},{"key":"ref_6","unstructured":"Mathur, S., Miller, R., Varshavsky, A., Trappe, W., and Mandayam, N. (July, January 28). Proximate: Proximity-based secure pairing using ambient wireless signals. Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, Bethesda, MD, USA."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Khalfaoui, S., Leneutre, J., Villard, A., Ma, J., and Urien, P. (2020). COOB: Hybrid Secure Device Pairing Scheme in a Hostile Environment. International Conference on Security and Privacy in Communication Systems, Springer.","DOI":"10.1007\/978-3-030-63095-9_27"},{"key":"ref_8","unstructured":"Jennings, C. (2020, December 12). Transitive Trust Enrollment for Constrained Devices. Available online: http:\/\/www.lix.polytechnique.fr\/hipercom\/SmartObjectSecurity\/papers\/CullenJennings.pdf."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Asim, M., Guajardo, J., Kumar, S.S., and Tuyls, P. (2009, January 26\u201329). Physical unclonable functions and their applications to vehicle system security. Proceedings of the VTC Spring 2009-IEEE 69th Vehicular Technology Conference, Barcelona, Spain.","DOI":"10.1109\/VETECS.2009.5073800"},{"key":"ref_10","unstructured":"Weimerskirch, A., Paar, C., and Wolf, M. (1999, January 19\u201322). Cryptographic component identification: Enabler for secure vehicles. Proceedings of the IEEE Vehicular Technology Conference, Dallas, TX, USA."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.46586\/tches.v2019.i4.243-290","article-title":"The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks","volume":"2019","author":"Nguyen","year":"2019","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"864812","DOI":"10.1155\/2015\/864812","article-title":"A New Arbiter PUF for Enhancing Unpredictability on FPGA","volume":"2015","author":"Machida","year":"2015","journal-title":"Sci. World J."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., Sehnke, F., S\u00f6lter, J., Dror, G., Devadas, S., and Schmidhuber, J. (2010, January 4\u20138). Modeling attacks on physical unclonable functions. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866335"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"97","DOI":"10.46586\/tches.v2020.i3.97-120","article-title":"Splitting the Interpose PUF: A Novel Modeling Attack Strategy","volume":"2020","author":"Wisiol","year":"2020","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Rostami, M., Koushanfar, F., Wallach, D.S., and Devadas, S. (2012, January 24\u201325). Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching. Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA.","DOI":"10.1109\/SPW.2012.30"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.ins.2019.06.047","article-title":"A double PUF-based RFID identity authentication protocol in service-centric internet of things environments","volume":"503","author":"Liang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Pour, A.A., Beroulle, V., Cambou, B., Danger, J.L., Di Natale, G., Hely, D., Guilley, S., and Karimi, N. (2020, January 25\u201329). PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. Proceedings of the 2020 IEEE European Test Symposium (ETS), Tallinn, Estonia.","DOI":"10.1109\/ETS48528.2020.9131578"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Choi, Y.J., Kang, H.J., and Lee, I.G. (2019). Scalable and secure internet of things connectivity. Electronics, 8.","DOI":"10.3390\/electronics8070752"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni, A. (2019). A survey of internet of things (IoT) Authentication schemes. Sensors, 19.","DOI":"10.3390\/s19051141"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ruhrmair, U., and Solter, J. (2014, January 24\u201328). PUF modeling attacks: An introduction and overview. Proceedings of the 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany.","DOI":"10.7873\/DATE2014.361"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Fang, Y., Wang, C., Ma, Q., Gu, C., O\u2019Neill, M., and Liu, W. (2018, January 26\u201330). Attacking Arbiter PUFs Using Various Modeling Attack Algorithms: A Comparative Study. Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Chengdu, China.","DOI":"10.1109\/APCCAS.2018.8605618"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Khalafalla, M., and Gebotys, C. (2019, January 25\u201329). PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy.","DOI":"10.23919\/DATE.2019.8714862"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Barbareschi, M., Bagnasco, P., and Mazzeo, A. (2015, January 4\u20136). Authenticating iot devices with physically unclonable functions models. Proceedings of the 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, Poland.","DOI":"10.1109\/3PGCIC.2015.117"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Aljafar, M.J., and Acken, J.M. (2021). Survey on the benefits of using memristors for PUFs. Int. J. Parallel Emergent Distrib.","DOI":"10.1080\/17445760.2021.1972295"},{"key":"ref_25","unstructured":"Council, N.R. (1993). Counterfeit Deterrent Features for the Next-Generation Currency Design, The National Academies Press."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/JIOT.2018.2849324","article-title":"RF-PUF: Enhancing IoT security through authentication of wireless nodes using in situ machine learning","volume":"6","author":"Chatterjee","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"011303","DOI":"10.1063\/1.5079407","article-title":"A PUF taxonomy","volume":"6","author":"McGrath","year":"2019","journal-title":"Appl. Phys. Rev."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Idriss, T., Idriss, H., and Bayoumi, M. (2016, January 12\u201314). A PUF-based paradigm for IoT security. Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA.","DOI":"10.1109\/WF-IoT.2016.7845456"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2276","DOI":"10.1109\/TIFS.2019.2895552","article-title":"Secret-Key Capacity Regions for Multiple Enrollments With an SRAM-PUF","volume":"14","author":"Kusters","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., Van Dijk, M., and Devadas, S. (2004, January 25). A technique to build a secret key in integrated circuits for identification and authentication applications. Proceedings of the 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No. 04CH37525), Honolulu, HI, USA."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Yu, M.D., M\u2019Ra\u00efhi, D., Verbauwhede, I., and Devadas, S. (2014, January 6\u20137). A noise bifurcation architecture for linear additive physical functions. Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), Arlington, VA, USA.","DOI":"10.1109\/HST.2014.6855582"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s13389-011-0016-9","article-title":"Recyclable pufs: Logically reconfigurable pufs","volume":"1","author":"Katzenbeisser","year":"2011","journal-title":"J. Cryptogr. Eng."},{"key":"ref_33","first-page":"1","article-title":"XOR-based low-cost reconfigurable PUFs for IoT security","volume":"18","author":"Liu","year":"2019","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"ref_34","unstructured":"Riedmiller, M., and Braun, H. (1993, January 25\u201329). A direct adaptive method for faster backpropagation learning: The RPROP algorithm. Proceedings of the IEEE International Conference on Neural Networks."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1876","DOI":"10.1109\/TIFS.2013.2279798","article-title":"PUF modeling attacks on simulated and silicon data","volume":"8","author":"Sehnke","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Boser, B.E., Guyon, I.M., and Vapnik, V.N. (1992, January 27\u201329). A training algorithm for optimal margin classifiers. Proceedings of the Fifth Annual Workshop on Computational Learning Theory, Pittsburgh, PA, USA.","DOI":"10.1145\/130385.130401"},{"key":"ref_37","unstructured":"S\u00f6lter, J. (2021, December 12). Cryptanalysis of Electrical PUFs Via Machine Learning Algorithms. Available online: https:\/\/www.researchgate.net\/profile\/Jan-Soelter\/publication\/259580784_Cryptanalysis_of_electrical_PUFs_via_machine_learning_algorithms\/links\/00b4952cc03621836c000000\/Cryptanalysis-of-electrical-PUFs-via-machine-learning-algorithms.pdf."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Kumar, S., and Niamat, M. Machine learning based Modeling Attacks on a Configurable PUF. Proceedings of the NAECON 2018-IEEE National Aerospace and Electronics Conference, Dayton, OH, USA.","DOI":"10.1109\/NAECON.2018.8556818"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Wang, S.C. (2003). Artificial neural network. Interdisciplinary Computing in Java Programming, Springer.","DOI":"10.1007\/978-1-4615-0377-4"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Suh, G.E., and Devadas, S. (2007, January 4\u20138). Physical unclonable functions for device authentication and secret key generation. Proceedings of the 2007 44th ACM\/IEEE Design Automation Conference, San Diego, CA, USA.","DOI":"10.1109\/DAC.2007.375043"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Gu, C., Chang, C.H., Liu, W., Yu, S., Ma, Q., and O\u2019neill, M. (2019, January 16\u201317). A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication. Proceedings of the 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Xi\u2019an, China.","DOI":"10.1109\/AsianHOST47458.2019.9006710"},{"key":"ref_42","unstructured":"Santikellur, P., Bhattacharyay, A., and Chakraborty, R.S. (2021, December 12). Deep Learning Based Model Building Attacks on Arbiter PUF Compositions. Available online: https:\/\/eprint.iacr.org\/2019\/566.pdf."},{"key":"ref_43","unstructured":"KhalafAlla, M. (2021, December 12). Comprehensive Study of Physical Unclonable Functions on FPGAs: Correlation Driven Implementation, Deep Learning Modeling Attacks, and Countermeasures. Available online: http:\/\/hdl.handle.net\/10012\/15989."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Lozano, J.A., Larra\u00f1aga, P., Inza, I., and Bengoetxea, E. (2006). The CMA Evolution Strategy: A Comparing Review. Towards a New Evolutionary Computation: Advances in the Estimation of Distribution Algorithms, Springer.","DOI":"10.1007\/3-540-32494-1"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Becker, G.T. (2015). The Gap between Promise and Reality: On the Insecurity of XOR Arbiter PUFs, Springer. International Workshop on Cryptographic Hardware and Embedded Systems.","DOI":"10.1007\/978-3-662-48324-4_27"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/TETC.2014.2300635","article-title":"Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching","volume":"2","author":"Rostami","year":"2014","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kroeger, T., Cheng, W., Guilley, S., Danger, J.L., and Karimi, N. (2020, January 9\u201313). Effect of aging on PUF modeling attacks based on power side-channel observations. Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.23919\/DATE48585.2020.9116428"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"5425","DOI":"10.1109\/TII.2019.2904845","article-title":"Application of fuzzy decision tree for signal classification","volume":"15","author":"Rabcan","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJBDCN.2021010101","article-title":"Decision Tree Trust (DTTrust)-Based Authentication Mechanism to Secure RPL Routing Protocol on Internet of Battlefield Thing (IoBT)","volume":"17","author":"Kannimuthu","year":"2021","journal-title":"Int. J. Bus. Data Commun. Netw. (IJBDCN)"},{"key":"ref_50","unstructured":"Zimmer, V., and Krau, M. (2021, December 12). Establishing the Root of Trust. Available online: https:\/\/uefi.org\/sites\/default\/files\/resources\/UEFI%20RoT%20white%20paper_Final%208%208%2016%20(003).pdf."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Maes, R. (2013). Physically Unclonable Functions: Properties. Physically Unclonable Functions, Springer.","DOI":"10.1007\/978-3-642-41395-7"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Cam-Winget, N., Sadeghi, A.R., and Jin, Y. (2016, January 5\u20139). Can IoT be secured: Emerging challenges in connecting the unconnected. Proceedings of the 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), Austin, TX, USA.","DOI":"10.1145\/2897937.2905004"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Ammar, M., Washha, M., and Crispo, B. (2018, January 15\u201317). WISE: Lightweight intelligent swarm attestation scheme for IoT (the verifier\u2019s perspective). Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus.","DOI":"10.1109\/WiMOB.2018.8589107"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Elnably, A., and Koushanfar, F. (2010). FPGA time-bounded unclonable authentication. International Workshop on Information Hiding, Springer.","DOI":"10.1007\/978-3-642-16435-4_1"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/TIFS.2011.2131133","article-title":"Time-bounded authentication of FPGAs","volume":"6","author":"Majzoobi","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_56","unstructured":"Hancke, G.P., and Kuhn, M.G. (April, January 31). Attacks on Time-of-Flight Distance Bounding Channels. Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, USA."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Brelurut, A., Gerault, D., and Lafourcade, P. (2015). Survey of distance bounding protocols and threats. International Symposium on Foundations and Practice of Security, Springer.","DOI":"10.1007\/978-3-319-30303-1_3"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Benesty, J., Chen, J., Huang, Y., and Cohen, I. (2009). Pearson correlation coefficient. Noise Reduction in Speech Processing, Springer.","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Tobisch, J., and Becker, G.T. (2015). On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation, Springer. International Workshop on Radio Frequency Identification: Security and Privacy Issues.","DOI":"10.1007\/978-3-319-24837-0_2"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Gao, Y., Li, G., Ma, H., Al-Sarawi, S.F., Kavehei, O., Abbott, D., and Ranasinghe, D.C. (2016, January 14\u201318). Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, Australia.","DOI":"10.1109\/PERCOMW.2016.7457162"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","article-title":"Machine-learning attacks on polypufs, ob-pufs, rpufs, lhs-pufs, and puf\u2013fsms","volume":"14","author":"Delvaux","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_62","first-page":"2020","article-title":"Xor Filters: Faster and Smaller Than Bloom and Cuckoo Filters","volume":"25","author":"Graf","year":"2019","journal-title":"J. Exp. Algorithmics"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Yilmaz, Y., Gunn, S.R., and Halak, B. (2018, January 2\u20134). Lightweight PUF-based authentication protocol for IoT devices. Proceedings of the 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Costa Brava, Spain.","DOI":"10.1109\/IVSW.2018.8494884"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Rivest, R.L. (1994). The RC5 Encryption Algorithm, Springer. International Workshop on Fast Software Encryption.","DOI":"10.1007\/3-540-60590-8_7"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Handschuh, H., and Heys, H.M. (1998). A Timing Attack on RC5, Springer. International Workshop on Selected Areas in Cryptography.","DOI":"10.1007\/3-540-48892-8_24"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Miyaji, A., Nonaka, M., and Takii, Y. (2002). Known Plaintext Correlation Attack against RC5, Springer. Cryptographers\u2019 Track at the RSA Conference.","DOI":"10.1007\/3-540-45760-7_10"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/TCSI.2020.3028508","article-title":"Set-Based Obfuscation for Strong PUFs Against Machine Learning Attacks","volume":"68","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1502781.1502786","article-title":"Techniques for design and implementation of secure reconfigurable PUFs","volume":"2","author":"Majzoobi","year":"2009","journal-title":"ACM Trans. Reconfigurable Technol. Syst. (TRETS)"},{"key":"ref_69","unstructured":"Adi, Y., Baum, C., Cisse, M., Pinkas, B., and Keshet, J. (2018, January 15\u201317). Turning your weakness into a strength: Watermarking deep neural networks by backdooring. Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gu, Z., Jang, J., Wu, H., Stoecklin, M.P., Huang, H., and Molloy, I. (2018, January 4\u20138). Protecting intellectual property of deep neural networks with watermarking. Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Korea.","DOI":"10.1145\/3196494.3196550"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/24\/8415\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:49:59Z","timestamp":1760168999000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/24\/8415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,16]]},"references-count":70,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["s21248415"],"URL":"https:\/\/doi.org\/10.3390\/s21248415","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,12,16]]}}}