2021 International Symposium on Devices, Circuits and Systems (ISDCS) 2021
DOI: 10.1109/isdcs52006.2021.9397896
|View full text |Cite
|
Sign up to set email alerts
|

PUF Based Hardware Security: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…For example, in a MEC environment, Tian et al 20 proposed a lightweight signature‐based authentication scheme with digital certificates. The PUF‐based authentication relies on using the physically unclonable functions (PUFs) for authentication 48 . It incorporates a challenge‐response pair mechanism, where the GCS challenges the UAVs and must provide a valid response.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in a MEC environment, Tian et al 20 proposed a lightweight signature‐based authentication scheme with digital certificates. The PUF‐based authentication relies on using the physically unclonable functions (PUFs) for authentication 48 . It incorporates a challenge‐response pair mechanism, where the GCS challenges the UAVs and must provide a valid response.…”
Section: Security Analysismentioning
confidence: 99%
“…The PUF-based authentication relies on using the physically unclonable functions (PUFs) for authentication. 48 It incorporates a challenge-response pair mechanism, where the GCS challenges the UAVs and must provide a valid response. Recent works consider PUF-based authentication to leverage the identity of UAVs and enable the uniqueness of the response.…”
Section: Authentication Factor and Cryptographic Featuresmentioning
confidence: 99%
“…Physically unclonable functions or features (PUFs) leverage random manufacturing variations and nonlinearities to derive an immutable device identifier [125][126][127][128][129] and can be used for detecting and avoiding counterfeits. We distinguish PUFs from fingerprints in that PUFs are intentionally added to a circuit to leverage the randomness in a manufacturing process to engineer a random, but repeatable, behavior.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
“…The second type of PUFs use digital circuits. Implementations, applications, and potential weaknesses of digital PUFs are reviewed in [125,126,129]. One standard use of a digital PUF is to authenticate the chip through a challenge-response approach.…”
Section: Physically Unclonable Functionsmentioning
confidence: 99%
See 1 more Smart Citation