Cybersecurity in Smart Homes 2022
DOI: 10.1002/9781119987451.ch3
|View full text |Cite
|
Sign up to set email alerts
|

SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Authenticating IoT devices also is challenging and requires special techniques. For example, Physical Unclonable Function (PUF) is used to authenticate the hardware for the telehealth distributed devices [20].…”
Section: Access Control Enginementioning
confidence: 99%
“…Authenticating IoT devices also is challenging and requires special techniques. For example, Physical Unclonable Function (PUF) is used to authenticate the hardware for the telehealth distributed devices [20].…”
Section: Access Control Enginementioning
confidence: 99%
“…In a telehealth environment, where humans (e.g., doctors) and CPS (e.g., Internet of Medical Things (IoMT) devices) work together to accomplish a task (e.g., operating on a patient), the nature of the relationship can be addressed as an interaction between two systems: the human (biological) and medical devices (cyber-physical) [ 23 ]. Physically unclonable functions (PUFs) is the preferred option for endowing hardware components with unique identities [ 24 ]. Figure 2 demonstrates the available entities in a telehealth system and the overall schema that can be considered for authentication.…”
Section: Authenticationmentioning
confidence: 99%
“…International Journal of Telemedicine and Applications processing [30,38,39]. This approach selects lownoise bits of the response bits such that encoding the PUF response generates noise-free data 3.2.…”
Section: Physical Unclonable Function (Puf)mentioning
confidence: 99%
“…Eliminating the dynamic noise can be accomplished using two approaches: Using forward error correction (FEC) such as the helper data algorithm [ 32 34 ] or fuzzy extractors [ 35 37 ] Using statistical properties of the PUF response to generate a reliable response without doing any processing [ 30 , 38 , 39 ]. This approach selects low-noise bits of the response bits such that encoding the PUF response generates noise-free data …”
Section: Physical Unclonable Function (Puf)mentioning
confidence: 99%
See 1 more Smart Citation