An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

UDhashing: Physical unclonable function-based user-device hash for endpoint authentication

Y Zheng, Y Cao, CH Chang - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
With IT consumerization, access control to remote system by endpoint user and endpoint
device is mandatory for security and privacy protection. Existing systems bind an end user …

Security Framework for IOT devices against Cyber-attacks

A Tabassum, W Lebda - arXiv preprint arXiv:1912.01712, 2019 - arxiv.org
Internet of Things (IoT) is the interconnection of heterogeneous smart devices through the
Internet with diverse application areas. The huge number of smart devices and the …

Low-cost security for next-generation IoT networks

NA Anagnostopoulos, S Ahmad, T Arul… - ACM Transactions on …, 2020 - dl.acm.org
In recent years, the ubiquitous nature of Internet-of-Things (IoT) applications as well as the
pervasive character of next-generation communication protocols, such as the 5G …

Access control for implantable medical devices

C Camara, P Peris-Lopez… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
The telemetry incorporate in the new generation of Implantable Medical Devices (IMDs)
allows remote access and re-programming without interfering with the daily routine of their …

Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol

K Eledlebi, A Alzubaidi, E Damiani… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The rapid integration of IoT devices into everyday decision-making processes underscores
the need for continuous user authentication and data integrity checking during network …

QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks

MM Mathews, V Panchami - Journal of Information Security and …, 2024 - Elsevier
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …

A novel IoT sensor authentication using HaLo extraction method and memory chip variability

H Gordon, T Lyp, C Kimbro, S Tehranipoor - Discover Internet of Things, 2021 - Springer
Since the inception of encrypted messages thousands of years ago, mathematicians and
scientists have continued to improve encryption algorithms in order to create more secure …

A Resource-Efficient Binary CNN Implementation for Enabling Contactless IoT Authentication

M Hasan, T Hoque, F Ganji, D Woodard, D Forte… - Journal of Hardware and …, 2024 - Springer
Access control is already an integral part of the Internet of Things (IoT) to prevent
unauthorized use of systems. However, in the post-pandemic world, contactless …