{"id":"https://openalex.org/W3169847528","doi":"https://doi.org/10.1109/access.2021.3084903","title":"A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices","display_name":"A Lightweight PUF-Based Authentication Protocol Using Secret Pattern Recognition for Constrained IoT Devices","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3169847528","doi":"https://doi.org/10.1109/access.2021.3084903","mag":"3169847528"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3084903","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3084903","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09444356.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09444356.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054514035","display_name":"Tarek Idriss","orcid":"https://orcid.org/0000-0003-4446-9444"},"institutions":[{"id":"https://openalex.org/I3132238960","display_name":"Institute of Electrical and Electronics Engineers","ror":"https://ror.org/01n002310","country_code":"US","type":"education","lineage":["https://openalex.org/I3132238960"]},{"id":"https://openalex.org/I52669646","display_name":"Western Washington University","ror":"https://ror.org/05wn7r715","country_code":"US","type":"education","lineage":["https://openalex.org/I52669646"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tarek A. Idriss","raw_affiliation_strings":["Western Washington University, Bellingham, WA, USA","( , IEEE"],"affiliations":[{"raw_affiliation_string":"Western Washington University, Bellingham, WA, USA","institution_ids":["https://openalex.org/I52669646"]},{"raw_affiliation_string":"( , IEEE","institution_ids":["https://openalex.org/I3132238960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034819596","display_name":"Haytham Idriss","orcid":"https://orcid.org/0000-0002-2904-9137"},"institutions":[{"id":"https://openalex.org/I3132238960","display_name":"Institute of Electrical and Electronics Engineers","ror":"https://ror.org/01n002310","country_code":"US","type":"education","lineage":["https://openalex.org/I3132238960"]},{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haytham A. Idriss","raw_affiliation_strings":["Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA","( , IEEE"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"( , IEEE","institution_ids":["https://openalex.org/I3132238960"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010023744","display_name":"Magdy Bayoumi","orcid":"https://orcid.org/0000-0002-0630-5273"},"institutions":[{"id":"https://openalex.org/I3132238960","display_name":"Institute of Electrical and Electronics Engineers","ror":"https://ror.org/01n002310","country_code":"US","type":"education","lineage":["https://openalex.org/I3132238960"]},{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Magdy A. Bayoumi","raw_affiliation_strings":["Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA","( , IEEE"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"( , IEEE","institution_ids":["https://openalex.org/I3132238960"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054514035"],"corresponding_institution_ids":["https://openalex.org/I3132238960","https://openalex.org/I52669646"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":8.7248,"has_fulltext":true,"cited_by_count":53,"citation_normalized_percentile":{"value":0.98574494,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"80546","last_page":"80558"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8335426449775696},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6736178398132324},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6416074633598328},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5649957060813904},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5427278876304626},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.539903461933136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.512279212474823},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4771513342857361},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4738745391368866},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.44272708892822266},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.43782445788383484},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4364062547683716},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4225742220878601},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18821629881858826}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8335426449775696},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6736178398132324},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6416074633598328},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5649957060813904},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5427278876304626},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.539903461933136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.512279212474823},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4771513342857361},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4738745391368866},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.44272708892822266},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.43782445788383484},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4364062547683716},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4225742220878601},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18821629881858826},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3084903","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3084903","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09444356.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b95f085b3cf848c6bc981b0011409c3c","is_oa":true,"landing_page_url":"https://doaj.org/article/b95f085b3cf848c6bc981b0011409c3c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 80546-80558 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3084903","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3084903","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09444356.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3169847528.pdf","grobid_xml":"https://content.openalex.org/works/W3169847528.grobid-xml"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W102487131","https://openalex.org/W104720657","https://openalex.org/W203500824","https://openalex.org/W1522301498","https://openalex.org/W1965515427","https://openalex.org/W1966117405","https://openalex.org/W1978495183","https://openalex.org/W2000171858","https://openalex.org/W2014299685","https://openalex.org/W2016244202","https://openalex.org/W2044389004","https://openalex.org/W2116374153","https://openalex.org/W2124926080","https://openalex.org/W2130351941","https://openalex.org/W2137153141","https://openalex.org/W2141682861","https://openalex.org/W2151759197","https://openalex.org/W2171762889","https://openalex.org/W2265382507","https://openalex.org/W2294709132","https://openalex.org/W2321234954","https://openalex.org/W2341260337","https://openalex.org/W2534919326","https://openalex.org/W2587447851","https://openalex.org/W2767905988","https://openalex.org/W2782213427","https://openalex.org/W2800984756","https://openalex.org/W2801237935","https://openalex.org/W2891953071","https://openalex.org/W2909319943","https://openalex.org/W2914062206","https://openalex.org/W2953470060","https://openalex.org/W2955419213","https://openalex.org/W2963154589","https://openalex.org/W2964121744","https://openalex.org/W2971676695","https://openalex.org/W2977243989","https://openalex.org/W2994145247","https://openalex.org/W2997932026","https://openalex.org/W2999816604","https://openalex.org/W3002189921","https://openalex.org/W3013543200","https://openalex.org/W3083277790","https://openalex.org/W3092333758","https://openalex.org/W3094433534","https://openalex.org/W3094745711","https://openalex.org/W3147945423","https://openalex.org/W4285719527","https://openalex.org/W6631190155","https://openalex.org/W6676995458","https://openalex.org/W6679357471","https://openalex.org/W6728743559","https://openalex.org/W6747652377","https://openalex.org/W6750823410"],"related_works":["https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W2619897385","https://openalex.org/W2364805998","https://openalex.org/W2963069143","https://openalex.org/W106082050","https://openalex.org/W2043851470","https://openalex.org/W2399882206","https://openalex.org/W3201780008","https://openalex.org/W2351645295"],"abstract_inverted_index":{"PUFs,":[0],"or":[1,40,145],"physical":[2],"unclonable":[3],"functions,":[4,147],"are":[5,172],"hardware":[6],"security":[7,13,26,34,155,180],"primitives":[8],"that":[9,28,60,73],"can":[10,105,116],"offer":[11,79],"lightweight":[12,24,70,150],"solutions":[14,27],"for":[15,47,87,111],"constrained":[16,88],"devices":[17,89],"through":[18],"challenge-response":[19],"authentication":[20,39,81,120],"protocols.":[21],"However,":[22],"the":[23,91,140,148,157],"PUF-based":[25,71,170],"have":[29],"been":[30],"presented":[31],"often":[32],"lack":[33,177],"features":[35],"such":[36],"as":[37],"mutual":[38,80],"message":[41,85],"encryption,":[42],"which":[43,112],"could":[44],"be":[45,117],"vital":[46],"many":[48],"applications.":[49],"Other":[50],"protocols":[51,171],"suffer":[52],"from":[53],"vulnerabilities":[54],"to":[55,64,78,100,165,176],"denial":[56],"of":[57,93,142,156],"service":[58],"attacks":[59,162],"make":[61],"them":[62],"impractical":[63],"use.":[65],"This":[66],"work":[67],"introduces":[68],"a":[69,113,128,132],"protocol":[72,96,159],"uses":[74],"secret":[75,84],"pattern":[76],"recognition":[77],"and":[82,103,131,174],"authenticated":[83],"exchange":[86],"on":[90],"Internet":[92],"Things.":[94],"The":[95,119,154],"utilizes":[97],"several":[98],"techniques":[99],"introduce":[101],"nonlinearity,":[102],"it":[104],"employ":[106],"any":[107,143],"strong":[108],"PUF":[109,129],"circuit":[110,130],"soft":[114],"model":[115],"generated.":[118],"process":[121],"requires":[122],"simple":[123],"bitwise":[124],"operations":[125],"along":[126],"with":[127],"true":[133],"random":[134],"number":[135],"generator":[136],"(TRNG).":[137],"By":[138],"avoiding":[139],"use":[141],"cryptographic":[144],"hash":[146],"protocol's":[149],"nature":[151],"is":[152,163],"preserved.":[153],"proposed":[158],"against":[160],"modeling":[161],"tested":[164],"showcase":[166],"its":[167],"resilience.":[168],"Similar":[169],"investigated":[173],"found":[175],"some":[178],"essential":[179],"features.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
