Security of IoT Devices with PUF-Based ID Tags: Preventing Hardware Substitution by Combining SRAM Cells Pattern Signature and ML Techniques.
Carmelo FelicettiAntonino RulloDomenico SaccàPublished in: DASC/PiCom/CBDCom/CyberSciTech (2023)
Keyphrases
- rfid tags
- low cost
- electronic devices
- rfid systems
- power consumption
- security problems
- digital copyright protection
- embedded systems
- maximum likelihood
- radio frequency identification
- lightweight
- key management
- security issues
- random number generator
- real time
- processing capabilities
- blind signature scheme
- hardware and software
- hardware implementation
- low power
- hardware platforms
- management system
- protection scheme
- security requirements
- intrusion detection
- camera phones
- information security
- digital signature
- high end
- blind signature
- signature verification
- mobile devices
- security mechanisms
- data transmission
- personal computer
- cloud computing
- embedded devices
- web pages
- trusted computing
- computing systems
- security policies
- network security
- big data
- security properties
- data acquisition
- computer systems
- ring signature scheme