Article
Automation & Control Systems
Mario Barbareschi, Valentina Casola, Alessandra De Benedictis, Erasmo La Montagna, Nicola Mazzocca
Summary: This article discusses the adoption of PUFs in the Industrial Internet of Things context, proposing a Pseudo-PUF architecture that successfully implements advanced security primitives while meeting device resource constraints. Analysis shows good results with negligible impact on devices, making the approach suitable for IIoT deployments.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Yan Zhang, Bing Li, Bo Liu, Yuanyuan Hu, Haipeng Zheng
Summary: The paper proposes a privacy-aware authentication protocol for multiserver CE-IoT systems by combining PUFs and the blockchain technique, which addresses privacy leakage, reduced reliability, and CRP synchronization issues. The security of the protocol is formally proved using a random oracle model, and security features are discussed to demonstrate resistance to various attacks. A prototype implementation confirms the protocol's efficiency, and comparison results show its compatibility with CE-IoT systems. Additionally, a simulation of the smart contract evaluates the scalability of the protocol.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Mathematics
Masoumeh Safkhani, Nasour Bagheri, Saqib Ali, Mazhar Hussain Malik, Omed Hassan Ahmed, Mehdi Hosseinzadeh, Amir H. Mosavi
Summary: Authentication protocols are commonly used in smart grids for security. A lightweight authentication system using Physically Unclonable Functions (PUF) is proposed to reduce physical attacks. The protocol is found to be vulnerable to server/meter impersonation attacks, but a modification is suggested to fix the security weaknesses. The improved protocol is successfully proven secure through the Scyther tool.
Article
Automation & Control Systems
Prosanta Gope, Owen Millwood, Biplab Sikdar
Summary: The Internet of Things (IoT) is becoming increasingly prevalent in daily life and requires strong security measures. Physically unclonable functions (PUFs) offer a low-cost solution for generating unique and secure fingerprints, but are vulnerable to machine learning attacks. This article introduces a lightweight and practical anonymous authentication protocol for IoT, which is resilient against machine learning attacks on PUFs.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Information Systems
Moneer Fakroon, Fayez Gebali, Mohammad Mamun
Summary: A secure telehealth system is proposed, utilizing multifactor authentication to protect mobile devices and IoT edge devices. The system uses healthcare professional's biometrics and physically unclonable functions (PUFs) for the edge devices. Security evaluation is conducted through formal and informal analysis, as well as model checking using AVISPA tool.
INTERNET OF THINGS
(2021)
Article
Computer Science, Information Systems
Sungjin Yu, Youngho Park
Summary: Wireless medical sensor networks (WMSNs) are a promising paradigm in the Internet of Medical Things (IoMT), enabling patients and doctors to access healthcare services wirelessly. However, the security of sensitive information exchanged over insecure channels is a concern. This paper proposes a robust and lightweight authentication protocol using blockchain and physically unclonable functions (PUFs) for WMSNs to address security vulnerabilities in existing schemes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Jaehan Park, Jae-Yoon Sim
Summary: This paper presents a physically unclonable function (PUF) based on a ring oscillator (RO) collapse with improved robustness against temperature variations. The PUF equips a low-drop-out (LDO) regulator to minimize temperature-sensitive dark bits and keep uncertainties by process mismatch large. The implementation of the proposed PUF shows a bit error rate (BER) of 0.039% in nominal conditions.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
(2023)
Article
Computer Science, Information Systems
Zeeshan Siddiqui, Jiechao Gao, Muhammad Khurram Khan
Summary: This study presents a lightweight two-factor authentication scheme for IoT devices based on the physical unclonable function (PUF). The proposed scheme is compared with other authentication schemes using detailed security analysis, showing its enhanced security and privacy attributes.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Abdulaziz Al-Meer, Saif Al-Kuwari
Summary: Physical Unclonable Function (PUF) is a promising lightweight solution for securing Internet of Things (IoT) devices, leveraging the manufacturing fluctuation process of integrated circuits. This survey provides a comprehensive review of the state of the art of PUF, including its architectures, protocols, and security for IoT.
ACM COMPUTING SURVEYS
(2023)
Article
Engineering, Electrical & Electronic
Karim Lounis, Steven H. H. Ding, Mohammad Zulkernine
Summary: With the continuous miniaturization of electronic devices and advancements in wireless communication technologies, the use of Unmanned Aerial Vehicles (UAVs), particularly Small Unmanned Aerial Vehicles (SUAVs or drones), has become increasingly popular in various civilian applications, providing great convenience to the public. However, the limited resources, risky environmental conditions, and wireless communication make drones susceptible to cyberthreats. Therefore, ensuring the security of drones, especially in inter-drone communication, has received significant attention from researchers. In this paper, a lightweight drone-to-drone authentication protocol called D2D-MAP is proposed, utilizing PUF (Physical Unclonable Function) technology. The protocol is designed, and its resilience against various attacks is evaluated using resource-constrained hardware, demonstrating superior security and performance compared to existing authentication protocols, meeting the requirements of SUAVs.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Engineering, Electrical & Electronic
E. Haodudin Nurkifli, Tzonelih Hwang
Summary: This article proposes the use of unclonable and untraceable sensor movement in distributed IoT environments to address security and privacy issues. Informal and formal analyses are conducted to ensure the security features of the proposed protocol and its resistance against various attacks. A comparison with related protocols in computational complexity demonstrates the suitability of our proposed protocol for the IoT environment.
IEEE SENSORS JOURNAL
(2023)
Article
Engineering, Electrical & Electronic
Tejasvi Alladi, Vinay Chamola, Naren
Summary: This paper introduces a two-way two-stage authentication protocol using Physical Unclonable Functions (PUFs) to address the physical security challenges of healthcare IoT devices. The protocol is lightweight and formally evaluated for security, compared to relevant protocols to show its suitability and robustness.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Jongmin Lee, Donghyeon Lee, Yongmin Lee, Yoonmyung Lee
Summary: The study introduces a leakage-based PUF for cost-effective security of IoT devices. By utilizing a specific method to generate response key bits and proposing a lossless stabilization scheme to improve system stability, the proposed method achieves high stability without any key losses.
IEEE JOURNAL OF SOLID-STATE CIRCUITS
(2021)
Article
Computer Science, Information Systems
Osama A. Khashan, Nour M. Khafajah
Summary: With the rapid increase in the number of IoT devices, the need for secure authentication mechanisms that are resource-efficient and scalable has become crucial. Conventional authentication approaches are not suitable for IoT devices due to their expensive cryptographic primitives and lack of scalability. Blockchain technology has been proposed as a solution, but existing blockchain-based authentication methods suffer from high overhead and authentication time delays. This study presents a hybrid centralized and blockchain-based authentication architecture for IoT systems, combining the efficiency of edge servers with the decentralized trust of blockchains. Lightweight cryptographic methods are implemented to achieve efficient authentication while limiting resource consumption. The proposed architecture demonstrates significant improvements in computation cost, execution time, and power consumption compared to traditional authentication schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Hardware & Architecture
Fahem Zerrouki, Samir Ouchani, Hafida Bouarfa
Summary: This manuscript provides a comprehensive survey of Physically Unclonable Functions (PUFs) as a promising research field in security with wide applications, especially with connected devices. It compares existing surveys about PUFs, provides background knowledge about PUF architectures and applications, surveys existing initiatives related to silicon PUFs in terms of implementation and design, compares their performance and security, classifies and compares existing silicon PUF applications and use cases, evaluates PUFs' performance metrics, presents related attacks, discusses the limitations and research opportunities in silicon PUF architectures and applications.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Engineering, Multidisciplinary
Xiao Wei, Muhammad Naveed Aman, Biplab Sikdar
Summary: This article introduces a lightweight GPS time spoofing detection technique based on the autocorrelation among consecutive GPS signals. The statistical runs test is used to generate training data for the classifier. The power spectral density values of multiple received GPS signals are combined to form a window, and the runs test is used to obtain a p-value to quantify the correlation between the present and previous window, thereby classifying GPS signals as spoofed or safe.
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS
(2022)
Editorial Material
Computer Science, Information Systems
Chien-Ming Chen, Shehzad Ashraf Chaudhry, Kuo-Hui Yeh, Muhammad Naveed Aman
SECURITY AND COMMUNICATION NETWORKS
(2022)
Article
Computer Science, Information Systems
Shivani Singh, Razia Sulthana, Tanvi Shewale, Vinay Chamola, Abderrahim Benslimane, Biplab Sikdar
Summary: Edge computing is a technological advancement that connects sensors and provides services at the device end, but security is a major concern. This article explores the security and privacy issues in different layers of the Edge computing architecture and the machine learning algorithms used to address these concerns. It also discusses various types of attacks on the Edge network and introduces intrusion detection systems and machine learning algorithms that overcome these security and privacy challenges.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Muhammad Aman, Haroon Basheer, Siddhant Dash, Ashutosh Sancheti, Jun Wen Wong, Xu Jia, Hoon Wei Lim, Biplab Sikdar
Summary: This article introduces a hybrid attestation technique, PRoM, for multicore Internet of Things devices, which ensures security against roving malware and high availability. Experimental results show that PRoM is more effective in terms of execution time compared to other attestation techniques.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar
Summary: The Internet of Vehicles (IoV) has the potential to enhance road safety and traffic flow, but also introduces security vulnerabilities. To address the challenges of ensuring data integrity and detecting malicious road side units (RSUs), this article proposes a lightweight mechanism called DRiVe, which utilizes probabilistic modeling and specially constructed authentication techniques.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Ahsanullah Memon, Mohd Wazir Bin Mustafa, Zohaib Hussain Laghari, Touqeer Ahmed Jumani, Waqas Anjum, Shafi Ullah, Muhammad Naveed Aman
Summary: This paper proposes a vector control (VC) method for BDFIGs in wind turbines, in which the proportional-integral (PI) gains for internal model control (IMC) are optimized to improve the dynamic response of the active and reactive power during inductive load insertion. The excellent characteristics of the notch filter are utilized to reduce a double fundamental frequency component to the point-of-common-coupling (PCC) voltage.
INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS
(2022)
Article
Computer Science, Information Systems
Muhammad Naveed Aman, Uzair Javaid, Biplab Sikdar
Summary: This article presents a secure patching framework for IoT, using remote attestation and physical unclonable functions (PUFs) to control and mitigate malware propagation.
IEEE SYSTEMS JOURNAL
(2022)
Article
Energy & Fuels
Muhammad M. Fayyaz, Irtaza M. Syed, Yi Meng, Muhammad N. Aman
Summary: This paper introduces a comprehensive model predictive control (CMPC) method for controlling a three-phase four-legged inverter (TP4LI) in PV systems. The CMPC model aims to predictively model and control switching frequency and higher voltage/current switching to reduce losses. The proposed approach successfully tracks balanced and unbalanced reference currents, reduces switching losses, and keeps the generated current total harmonic distortion (THD) within industry limits.
Article
Chemistry, Analytical
James Adu Ansere, Mohsin Kamal, Izaz Ahmad Khan, Muhammad Naveed Aman
Summary: This paper addresses the problem of energy optimization for IoT devices. The limited energy resources of IoT devices powered by renewable energy sources and the significant energy consumption of these small and low-powered devices are the main concerns. By maximizing the energy efficiency of the radio sub-system, the performance of the IoT network can be significantly increased. The proposed technique improves the energy efficiency of IoT systems compared to the state-of-the-art work.
Proceedings Paper
Computer Science, Information Systems
Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar
Summary: This paper introduces a lightweight UAV data integrity technique PIC, which verifies the integrity of data packets by generating authentication parameters regularly, effectively reducing communication overhead and latency.
IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS)
(2022)
Proceedings Paper
Telecommunications
Nalam Venkata Abhishek, Muhammad Naveed Aman, Teng Joon Lim, Biplab Sikdar
Summary: The use of unmanned aerial vehicles (UAVs) has increased rapidly in recent years. However, if operational cyber security is not handled effectively, these technologies can pose significant hazards. This paper proposes a lightweight data integrity technique called MaDe, which can identify malicious UAVs through packet verification.
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)
(2022)
Article
Acoustics
Abdullah Zaini Alsheibi, Kimon P. Valavanis, Asif Iqbal, Muhammad Naveed Aman
Summary: With the advancement in voice-communication-based human-machine interface technology in smart home devices, a speech enhancement framework is proposed in this manuscript to improve the performance of algorithms by suppressing noise and recovering clean signals.
Article
Education & Educational Research
Mukhtar Ullah, Muhammad Naveed Aman, Olaf Wolkenhauer, Jamshed Iqbal
Summary: The natural exponential and logarithm can be introduced to undergraduate engineering students through a novel interpretation of derivatives that does not rely on limits. By using two common differential equations, it is demonstrated that the natural exponential/logarithm can arise from this approach, providing an intuitive introduction of these functions and time constants in first-order dynamical systems.
INTERNATIONAL JOURNAL OF MATHEMATICAL EDUCATION IN SCIENCE AND TECHNOLOGY
(2022)