2021
DOI: 10.1109/tdsc.2019.2934438
|View full text |Cite
|
Sign up to set email alerts
|

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

Abstract: The simplicity of deployment and perpetual operation of energy harvesting devices provides a compelling proposition for a new class of edge devices for the Internet of Things. In particular, Computational Radio Frequency Identification (CRFID) devices are an emerging class of battery free, computational, sensing enhanced devices that harvest all of their energy for operation. Despite wireless connectivity and powering, secure wireless firmware updates remains an open challenge for CRFID devices due to: intermi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(32 citation statements)
references
References 51 publications
0
32
0
Order By: Relevance
“…In majority voting (MV), given q repeated response measurements under an operating condition, the response value ('1'/'0') enrolled is that which shows no less than q 2 measurements; with q an odd integer. In reliable response pre-selection (PreSel), each PUF response under an operating condition is repeatedly measured i times, only response bits that exhibit 100% reliable regeneration (all '1's/'0's) are selected for use and enrollment-a detailed methodology with a resource limited device is in [22].…”
Section: A Response Pre-processingmentioning
confidence: 99%
See 1 more Smart Citation
“…In majority voting (MV), given q repeated response measurements under an operating condition, the response value ('1'/'0') enrolled is that which shows no less than q 2 measurements; with q an odd integer. In reliable response pre-selection (PreSel), each PUF response under an operating condition is repeatedly measured i times, only response bits that exhibit 100% reliable regeneration (all '1's/'0's) are selected for use and enrollment-a detailed methodology with a resource limited device is in [22].…”
Section: A Response Pre-processingmentioning
confidence: 99%
“…In fact, most IoT devices do not have FPGAs but operate using MCUs. Further, to the best of our knowledge, there is only one end-to-end software PUF key generator implementation on a low power computing platform in the form of a highly resource constrained and batteryless device that relies only on harvested RF energy for operations [22].Therefore, we aim to provide a simple and timely guide to the Ubiquitous Computing community for realizing PUF based key generators to benefit from their inherent key security. In particular:…”
Section: Introductionmentioning
confidence: 99%
“…Hence, only within the period highlighted in light blue, can the Load be actually powered. Such a period is called the intermittent power cycle (IPC), which is short and fragmented over time in practice [9]. Fig.…”
Section: A Intermittent Poweringmentioning
confidence: 99%
“…In this context, a low-power sleep state [31] can be used to intermit execution to allow the reservoir capacitor restore its energy. This intermittent execution model (IEM) can realize task execution in an energy limited setting [9]. First, it stretches the time frame to complete the task and hence allows the energy harvester to collect more energy.…”
Section: Intermittent Execution Modelmentioning
confidence: 99%
See 1 more Smart Citation