2020
DOI: 10.1186/s13638-020-01839-6
|View full text |Cite
|
Sign up to set email alerts
|

A PUF-based cryptographic security solution for IoT systems on chip

Abstract: The integration of multicore processors and peripherals from multiple intellectual property core providers as hardware components of IoT multiprocessor systems-on-chip (SoC) represents a source of security vulnerabilities for the in-chip communication. This paper describes the concept and the practical results of a SoC security implementation that is illustrative for IoT applications. The mechanism employed in this approach uses physically unclonable functions (PUF) and symmetric cryptography in order to encry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…First, to mandate vendors appoint a security contact responsible to handle inbound vulnerability disclosure requests with market access conditioning. Previously discussed by Balan (2021), this requirement is the least burdening that would satisfy the resolve of the matter at hand if less regulation were desirable. It maintains the freedom of opting for whichever platform, technology, investment level, team structure and business strategy, while allowing for an alwayson, security-dedicated, previously unavailable communication channel.…”
Section: Discussionmentioning
confidence: 99%
“…First, to mandate vendors appoint a security contact responsible to handle inbound vulnerability disclosure requests with market access conditioning. Previously discussed by Balan (2021), this requirement is the least burdening that would satisfy the resolve of the matter at hand if less regulation were desirable. It maintains the freedom of opting for whichever platform, technology, investment level, team structure and business strategy, while allowing for an alwayson, security-dedicated, previously unavailable communication channel.…”
Section: Discussionmentioning
confidence: 99%
“…While we see development in both data assortment abilities of IoT devices and examination limit on the gathered data, wireless communications' exhibition and power effectiveness have not scaled as much because of actual imperatives. Subsequently, the data assortment limit of low-power IoT gadgets is regularly confined by the upheld data rate and power utilization of its wireless communication module [10][11]. Network advances for IoT devices give a wide spectrum of decisions, traversing from fast and eager for power to moderate and power proficient.…”
Section: Introductionmentioning
confidence: 99%