{"id":"https://openalex.org/W2296628198","doi":"https://doi.org/10.1109/aspdac.2016.7427991","title":"A mutual auditing framework to protect IoT against hardware Trojans","display_name":"A mutual auditing framework to protect IoT against hardware Trojans","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2296628198","doi":"https://doi.org/10.1109/aspdac.2016.7427991","mag":"2296628198"},"language":"en","primary_location":{"id":"doi:10.1109/aspdac.2016.7427991","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aspdac.2016.7427991","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100322194","display_name":"Chen Liu","orcid":"https://orcid.org/0000-0003-0763-2003"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chen Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Delaware, Newark, DE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Delaware, Newark, DE","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084074589","display_name":"Patrick Cronin","orcid":"https://orcid.org/0000-0003-2091-4830"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Cronin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Delaware, Newark, DE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Delaware, Newark, DE","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016268650","display_name":"Chengmo Yang","orcid":"https://orcid.org/0000-0003-0978-1504"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chengmo Yang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Delaware, Newark, DE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Delaware, Newark, DE","institution_ids":["https://openalex.org/I86501945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100322194"],"corresponding_institution_ids":["https://openalex.org/I86501945"],"apc_list":null,"apc_paid":null,"fwci":2.2529,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.86768354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"69","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7604255676269531},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7537473440170288},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5948032140731812},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5790968537330627},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5779555439949036},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.4609736502170563},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.44586411118507385},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44215235114097595},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43105506896972656}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7604255676269531},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7537473440170288},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5948032140731812},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5790968537330627},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5779555439949036},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.4609736502170563},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.44586411118507385},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44215235114097595},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43105506896972656},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aspdac.2016.7427991","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aspdac.2016.7427991","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1940397557","https://openalex.org/W1962851278","https://openalex.org/W1965573937","https://openalex.org/W1967284602","https://openalex.org/W1972843069","https://openalex.org/W1988712140","https://openalex.org/W2051152775","https://openalex.org/W2053783350","https://openalex.org/W2098536553","https://openalex.org/W2101528158","https://openalex.org/W2115506459","https://openalex.org/W2127769792","https://openalex.org/W2136032111","https://openalex.org/W2142009725","https://openalex.org/W2143591442","https://openalex.org/W2150928734","https://openalex.org/W2154978532","https://openalex.org/W2155947520","https://openalex.org/W2160696581","https://openalex.org/W2161998562","https://openalex.org/W2165491783","https://openalex.org/W2167036627","https://openalex.org/W2171761395","https://openalex.org/W2175486934","https://openalex.org/W4244260788","https://openalex.org/W4246349508","https://openalex.org/W4252430522","https://openalex.org/W6674690352","https://openalex.org/W6682184091"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W17155033"],"abstract_inverted_index":{"Internet-of-Things":[0],"(IoT),":[1],"wherein":[2,109],"sensor":[3],"nodes":[4,103,110],"of":[5,62,80,91,114],"different":[6,12],"types":[7,61],"are":[8,14,27],"used":[9,18],"to":[10,16,40,45,50,68,73,87,97,104,123,127],"monitor":[11,74,88,111],"objects,":[13],"expected":[15],"be":[17],"in":[19,31,54,76],"many":[20],"critical":[21],"domains.":[22],"However,":[23],"hardware":[24],"Trojans,":[25],"which":[26],"malicious":[28,134],"modifications":[29],"implanted":[30],"individual":[32],"nodes,":[33,94,135],"may":[34],"utilize":[35],"the":[36,55,77,89,93,102,112],"wireless":[37],"connection":[38],"facility":[39],"leak":[41,128],"confidential":[42],"information":[43,129],"or":[44,130],"collude":[46,131],"with":[47,132],"each":[48],"other":[49,133],"cause":[51],"catastrophic":[52],"failures":[53],"IoT.":[56,78],"To":[57],"defend":[58],"against":[59],"these":[60],"network-level":[63],"threats,":[64],"our":[65],"goal":[66],"is":[67,121],"develop":[69],"a":[70,83,106],"lightweight":[71],"framework":[72,108],"communications":[75],"Instead":[79],"relying":[81],"on":[82],"centralized":[84],"data":[85],"center":[86],"behavior":[90],"all":[92],"we":[95],"propose":[96],"exploit":[98],"vendor":[99],"diversity":[100],"among":[101],"build":[105],"distributed":[107],"trustworthiness":[113],"their":[115],"neighbors.":[116],"This":[117],"mutual":[118],"auditing":[119],"scheme":[120],"able":[122],"detect":[124],"any":[125],"attempt":[126],"thus":[136],"constructing":[137],"trustworthy":[138],"communication":[139],"channels":[140],"between":[141],"untrustworthy":[142],"nodes.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
