Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security
暂无分享,去创建一个
[1] R. Pappu,et al. Physical One-Way Functions , 2002, Science.
[2] Frans M. J. Willems,et al. Secure Key Generation from Biased PUFs , 2015, CHES.
[3] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[4] Srinivas Devadas,et al. Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.
[5] John Ross Wallrabenstein. Practical and Secure IoT Device Authentication Using Physical Unclonable Functions , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[6] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[7] Jaeyoung Kim,et al. A fully integrated ieee IEEE 802.15.4g MR-FSK SoC soc for smart utility network applications , 2014, IEEE Transactions on Consumer Electronics.
[8] Geert Jan Schrijen,et al. Comparative analysis of SRAM memories used as PUF primitives , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[9] Yousung Kang,et al. Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices , 2018, 2018 IEEE SENSORS.
[10] Martin Bossert,et al. Using Convolutional Codes for Key Extraction in Physical Unclonable Functions , 2017, ArXiv.
[11] Woong Choi,et al. A DRAM based physical unclonable function capable of generating >1032 Challenge Response Pairs per 1Kbit array for secure chip authentication , 2017, 2017 IEEE Custom Integrated Circuits Conference (CICC).
[12] Georgios Kambourakis,et al. The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[13] Mahesh Sooriyabandara,et al. Low Power Wide Area Networks: An Overview , 2016, IEEE Communications Surveys & Tutorials.
[14] Lilian Bossuet,et al. Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators , 2016, IEEE Transactions on Information Forensics and Security.
[15] Sajad Shirali-Shahreza,et al. Protecting Home User Devices with an SDN-Based Firewall , 2018, IEEE Transactions on Consumer Electronics.
[16] Tim Güneysu,et al. Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things , 2017, IEEE Access.
[17] Patrick Schaumont,et al. A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[18] M. Bossert,et al. Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable Functions , 2017 .
[19] M. Aman. Physical Unclonable Functions for IoT Security , 2016 .
[20] Akashi Satoh,et al. Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.
[21] Muhammad Khurram Khan,et al. Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy , 2019, IEEE Transactions on Consumer Electronics.
[22] Daya Gupta,et al. NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access , 2018, IEEE Transactions on Consumer Electronics.
[23] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[24] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[25] Deepak Puthal,et al. PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things , 2019, IEEE Transactions on Consumer Electronics.
[26] Martin Bossert,et al. On Error Correction for Physical Unclonable Functions , 2015, ArXiv.
[27] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[28] Lilian Bossuet,et al. Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[29] Mahmoud Elkhodr,et al. Emerging Wireless Technologies in the Internet of Things: a Comparative Study , 2016, ArXiv.
[30] Stefan Katzenbeisser,et al. Run-Time Accessible DRAM PUFs in Commodity Devices , 2016, CHES.
[31] Takafumi Aoki,et al. Quaternary Debiasing for Physically Unclonable Functions , 2018, 2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL).
[32] Dooho Choi,et al. Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).