Building Secure SRAM PUF Key Generators on Resource Constrained Devices.
Yansong GaoYang SuWei YangShiping ChenSurya NepalDamith Chinthana RanasinghePublished in: CoRR (2019)
Keyphrases
- resource constrained
- security mechanisms
- key management
- electronic devices
- resource constraints
- wireless sensor networks
- embedded systems
- sensor networks
- visual sensor networks
- resource limitations
- power consumption
- multipath
- rfid tags
- data sets
- real time
- sensor nodes
- intrusion detection
- mobile devices
- search algorithm