2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2019
DOI: 10.1109/isvlsi.2019.00124
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Based IoT Edge Node Security Attack and Countermeasures

Abstract: Advances in technology have enabled tremendous progress in the development of a highly connected ecosystem of ubiquitous computing devices collectively called the Internet of Things (IoT). Ensuring the security of IoT devices is a high priority due to the sensitive nature of the collected data. Physically Unclonable Functions (PUFs) have emerged as critical hardware primitive for ensuring the security of IoT nodes. Malicious modeling of PUF architectures has proven to be difficult due to the inherently stochas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 27 publications
0
11
0
1
Order By: Relevance
“…Then, we discard node (9,10) from further consideration as it is reachable from the rest of the nodes (C=0.4). As higher CC indicates maximum closeness, we sort the CC column and find that the nodes (9,12) and (8,11) both have minimum CC as well as moderate closeness (C=0.2). However, for BC, we see the value of each node is '0'.…”
Section: Motivational Examplementioning
confidence: 99%
See 3 more Smart Citations
“…Then, we discard node (9,10) from further consideration as it is reachable from the rest of the nodes (C=0.4). As higher CC indicates maximum closeness, we sort the CC column and find that the nodes (9,12) and (8,11) both have minimum CC as well as moderate closeness (C=0.2). However, for BC, we see the value of each node is '0'.…”
Section: Motivational Examplementioning
confidence: 99%
“…During explicit payload, we use existing nets (8,11) and (9,12) to act as HT triggering signal (HTT), and the edge between N12 and N13 is being modified to work as HT payload (HTP) due to the inclusion of output of HTT. In comparison to Fig.…”
Section: Motivational Examplementioning
confidence: 99%
See 2 more Smart Citations
“…We also show that the approach can be extended, through unsupervised noisy pretraining to handle two (2) standard encryption protocols and three (3) common PUF architectures, which form some of the more common node authentication setups in practice. The preliminary version of this work has been published in [19,26]. The rest of this paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%