A puf based can security framework
… Our approach adheres to CAN standard ISO 11898-1. A reliable PUF response is used in …
PROPOSED DESIGN We propose a more efficient and more secure CAN security framework …
PROPOSED DESIGN We propose a more efficient and more secure CAN security framework …
PUF-based post-quantum CAN-FD framework for vehicular security
T Cultice, H Thapliyal - Information, 2022 - mdpi.com
… Proposed PUF-Based CAN-FD Post Quantum Framework … security framework designed
for use in CAN-FD utilizing PUF responses and post-quantum security. The structure of the …
for use in CAN-FD utilizing PUF responses and post-quantum security. The structure of the …
PUF based secure framework for hardware and software security of drones
… In this paper, we propose a PUF based security framework for drones that will require each
hardware of the drone to have an inbuilt PUF logic. For the proof of concept, the PUF logic is …
hardware of the drone to have an inbuilt PUF logic. For the proof of concept, the PUF logic is …
A PUF-based unified identity verification framework for secure IoT hardware via device authentication
Z Huang, Q Wang - World Wide Web, 2020 - Springer
… This section describes the proposed security framework for system-level device … of possible
security threats which may occur in IoT hardware. The overview of the proposed framework …
security threats which may occur in IoT hardware. The overview of the proposed framework …
A PUF-based secure communication protocol for IoT
U Chatterjee, RS Chakraborty… - ACM Transactions on …, 2017 - dl.acm.org
… Our scheme employs a Physically Unclonable Function (PUF) to generate the public identity
… proofs of security in the Session Key Security and Universally Composable Framework of …
… proofs of security in the Session Key Security and Universally Composable Framework of …
Supervised machine learning tools and PUF based internet of vehicles authentication framework
… security mechanisms, strength, and robustness, an authentication framework consisting of
PUF … The proposed method needs limited CRPs of a weak PUF to produce a large machine …
PUF … The proposed method needs limited CRPs of a weak PUF to produce a large machine …
PUF and ID-based key distribution security framework for advanced metering infrastructures
… , we propose a security framework for wireless mesh-based AMI. It … -based symmetric-key
cryptography and identitybased cryptography to enable an efficient and scalable framework …
cryptography and identitybased cryptography to enable an efficient and scalable framework …
Easy-sec: Puf-based rapid and robust authentication framework for the internet of vehicles
PK Sadhu, VP Yanambaka - IFIP International Internet of Things …, 2023 - Springer
… 3.1 Overview of PUF-Based Ultalight Authentication Framework Figure 1 shows the proposed
PUF based security paradigm. As shown in the figure, AVs are the end devices. Each AV is …
PUF based security paradigm. As shown in the figure, AVs are the end devices. Each AV is …
PUFchain 4.0: Integrating PUF-based TPM in distributed ledger for security-by-design of IoT
… of an IoT node from the hardware level using PUF based security mechanism. A comparison
of proposed … The security framework is proposed to be implemented on an IoT network with …
of proposed … The security framework is proposed to be implemented on an IoT network with …
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
… In [20], Wallrabenstein has proposed to use PUF based Elliptic Curve Cryptosystem for IOT
framework, but storing helper data for each challenge in the node can lead to unacceptable …
framework, but storing helper data for each challenge in the node can lead to unacceptable …