This paper presents a overview over research activities in the field of Physically Unclonable Functions (PUFs) that reach into the domain of the Internet of Things (IoT) and summary of their outcomes. After brief introduction PUF technology and its basic properties, paper analyses one of most common PUF types, SRAM PUF, on selected set of commodity hardware. The paper also presents the authentication scheme, based on SRAM PUF, for resource-constrained embedded devices especially designed to be employed in the domain of the Internet of Things (IoT).This work was partially supported by by the Austrian Ministry for Transport, Innovation and Technology under the framework of "IKT der Zukunft" with the FFG grant agreement project 848732
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
This paper describes an offline authentication scheme for resource-constrained embedded devices desi...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physically Unclonable Functions (PUF) have been an interest in the security technology world. Althou...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...
In this work, we examine very briefly a number of Advanced Reconfigurable Physical Unclonable Functi...
International audienceToday, life is becoming increasingly connected. From TVs to smartphones, inclu...
Conventional cryptographic solutions to the security are expensive in terms of computing resources (...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
This paper describes an offline authentication scheme for resource-constrained embedded devices desi...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
Physically Unclonable Functions (PUF) have been an interest in the security technology world. Althou...
In this work, we examine whether Physical Unclonable Functions (PUFs) can act as lightweight securit...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
Device authentication is an essential security feature for the Internet of Things (IoT). Physical un...
International audienceSeveral authentication protocols based on Physically Unclonable Functions (PUF...
Secure communication has been paramount throughout history. Although in the early ages it was mainly...
The growing convergence among Information and Operation Technology worlds in modern Industrial Inter...
In this work, we examine very briefly a number of Advanced Reconfigurable Physical Unclonable Functi...
International audienceToday, life is becoming increasingly connected. From TVs to smartphones, inclu...
Conventional cryptographic solutions to the security are expensive in terms of computing resources (...
The Internet of Things (IoT) consists of numerous inter-connected resource-constrained devices such ...
With the boom of the Internet of Things (IoT), security is increasingly becoming a requirement rathe...
This paper describes an offline authentication scheme for resource-constrained embedded devices desi...