2019
DOI: 10.1109/jiot.2018.2874626
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Piezoelectric-Based Physically Unclonable Function for IoT Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…The microcontroller must sample each connected solar cell through its ADC and then generate a response. For the actual comparison algorithm used to generate the response, we used the one described in [17]. Our implementation required accounting for the inherent noise in the ADC.…”
Section: Software Components Of Proposed Pufmentioning
confidence: 99%
“…The microcontroller must sample each connected solar cell through its ADC and then generate a response. For the actual comparison algorithm used to generate the response, we used the one described in [17]. Our implementation required accounting for the inherent noise in the ADC.…”
Section: Software Components Of Proposed Pufmentioning
confidence: 99%
“…However, sensors and similar sorts of measurement devices are especially attractive for designing PUFs since their core functionality of measuring and reporting values can be directly incorporated into a PUF. Sensor PUF designs have been proposed based on a large range of components including microelectromechanical systems (MEMS)-based sensors [27,28,29], device touchscreens [30], photodiodes [31], solar cells [32], and piezoelectric sensors [33]. More information about these designs will be presented in Section V. For further information about other PUF designs, a number of existing comprehensive literature surveys are available.…”
Section: Background and Related Workmentioning
confidence: 99%
“…After this step is completed, an algorithm can be used to process the individual voltage data and construct a 128-bit response. One such example algorithm can be found in [33]. That algorithm generates a response by making a series of comparisons between total output readings for predetermined groups of a given component.…”
Section: Proposed Design Of a Thermistor Temperature Sensor-based Pufmentioning
confidence: 99%
See 2 more Smart Citations