2021 IEEE 34th International System-on-Chip Conference (SOCC) 2021
DOI: 10.1109/socc52499.2021.9739553
|View full text |Cite
|
Sign up to set email alerts
|

LC-Physical Unclonable Function in Wireless 3D IC for Securing Internet of Things Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Given the limited resources available in the IoT environment, instead of traditional secret key encryption (because of the risk of theft by attackers) the team used a physical unclonable feature to ensure security, which utilizes manufacturing process variations to generate a unique and device-specific identity for the physical system that corresponds to a specific instance of a device rather than a generic identity for a class of devices, making the encryption unclonable and thus reducing the chance that an attacker will be able to eavesdrop on it, thus reducing the chance that an attacker will be able to eavesdrop on it. cloning, thus reducing the possibility of an attacker cracking the encryption or predicting the secret key through other similar IoT devices [9]. At the same time, this encryption method does not require expensive and bulky encryption hardware, and has the advantages of low energy consumption, lightweight and flexible, and does not require huge computational resources, which is especially suitable for IoT devices with limited computational resources and has a wide range of application prospects.…”
Section: New Designs On Iot Securitymentioning
confidence: 99%
“…Given the limited resources available in the IoT environment, instead of traditional secret key encryption (because of the risk of theft by attackers) the team used a physical unclonable feature to ensure security, which utilizes manufacturing process variations to generate a unique and device-specific identity for the physical system that corresponds to a specific instance of a device rather than a generic identity for a class of devices, making the encryption unclonable and thus reducing the chance that an attacker will be able to eavesdrop on it, thus reducing the chance that an attacker will be able to eavesdrop on it. cloning, thus reducing the possibility of an attacker cracking the encryption or predicting the secret key through other similar IoT devices [9]. At the same time, this encryption method does not require expensive and bulky encryption hardware, and has the advantages of low energy consumption, lightweight and flexible, and does not require huge computational resources, which is especially suitable for IoT devices with limited computational resources and has a wide range of application prospects.…”
Section: New Designs On Iot Securitymentioning
confidence: 99%