{"id":"https://openalex.org/W4399396332","doi":"https://doi.org/10.1109/host55342.2024.10545387","title":"PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices","display_name":"PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4399396332","doi":"https://doi.org/10.1109/host55342.2024.10545387"},"language":"en","primary_location":{"id":"doi:10.1109/host55342.2024.10545387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55342.2024.10545387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094063479","display_name":"Hongming Fei","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Hongming Fei","raw_affiliation_strings":["The National University of Singapore,Department of Electrical and Computer Engineering,Singapore","Department of Electrical and Computer Engineering, The National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"The National University of Singapore,Department of Electrical and Computer Engineering,Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024735854","display_name":"Owen Millwood","orcid":"https://orcid.org/0000-0002-7250-8271"},"institutions":[{"id":"https://openalex.org/I91136226","display_name":"University of Sheffield","ror":"https://ror.org/05krs5044","country_code":"GB","type":"education","lineage":["https://openalex.org/I91136226"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Owen Millwood","raw_affiliation_strings":["The University of Sheffield,Department of Computer Science,Sheffield,UK","Department of Computer Science, The University of Sheffield, Sheffield, UK"],"affiliations":[{"raw_affiliation_string":"The University of Sheffield,Department of Computer Science,Sheffield,UK","institution_ids":["https://openalex.org/I91136226"]},{"raw_affiliation_string":"Department of Computer Science, The University of Sheffield, Sheffield, UK","institution_ids":["https://openalex.org/I91136226"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064350184","display_name":"Prosanta Gope","orcid":"https://orcid.org/0000-0003-2786-0273"},"institutions":[{"id":"https://openalex.org/I91136226","display_name":"University of Sheffield","ror":"https://ror.org/05krs5044","country_code":"GB","type":"education","lineage":["https://openalex.org/I91136226"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Prosanta Gope","raw_affiliation_strings":["The University of Sheffield,Department of Computer Science,Sheffield,UK","Department of Computer Science, The University of Sheffield, Sheffield, UK"],"affiliations":[{"raw_affiliation_string":"The University of Sheffield,Department of Computer Science,Sheffield,UK","institution_ids":["https://openalex.org/I91136226"]},{"raw_affiliation_string":"Department of Computer Science, The University of Sheffield, Sheffield, UK","institution_ids":["https://openalex.org/I91136226"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045440843","display_name":"Jack Miskelly","orcid":"https://orcid.org/0000-0001-8063-4019"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jack Miskelly","raw_affiliation_strings":["Queen&#x0027;s University,Centre for Secure Information Technologies,Belfast,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Queen&#x0027;s University,Centre for Secure Information Technologies,Belfast,United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041189303","display_name":"Biplab Sikdar","orcid":"https://orcid.org/0000-0002-0084-4647"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Biplab Sikdar","raw_affiliation_strings":["The National University of Singapore,Department of Electrical and Computer Engineering,Singapore","Department of Electrical and Computer Engineering, The National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"The National University of Singapore,Department of Electrical and Computer Engineering,Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5094063479"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":3.9317,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.94811203,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"309","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7909001111984253},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7074123620986938},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6064966320991516},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.597100019454956},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5329020619392395},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5229388475418091},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5221619606018066},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4611409604549408},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46097129583358765},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4608345627784729},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.44948089122772217},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.44460952281951904},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4280101954936981},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3964761197566986},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12023213505744934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7909001111984253},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7074123620986938},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6064966320991516},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.597100019454956},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5329020619392395},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5229388475418091},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5221619606018066},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4611409604549408},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46097129583358765},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4608345627784729},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.44948089122772217},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.44460952281951904},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4280101954936981},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3964761197566986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12023213505744934},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/host55342.2024.10545387","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host55342.2024.10545387","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/6659f582-04d3-48d1-9538-6e832d124f3d","is_oa":false,"landing_page_url":"https://pure.qub.ac.uk/en/publications/6659f582-04d3-48d1-9538-6e832d124f3d","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fei, H, Millwood, O, Gope, P, Miskelly, J & Sikdar, B 2024, PhenoAuth: a novel PUF-phenotype-based authentication protocol for IoT devices. in 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST): Proceedings. IEEE International Symposium on Hardware Oriented Security and Trust (HOST): Proceedings, IEEE, pp. 309-319, 2024 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2024, Tysons Corner, VA, United States, 06/05/2024. https://doi.org/10.1109/HOST55342.2024.10545387","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1011209183","display_name":null,"funder_award_id":"FCP-NUS-RG-2022-019","funder_id":"https://openalex.org/F4320306228","funder_display_name":"American Federation for Aging Research"}],"funders":[{"id":"https://openalex.org/F4320306228","display_name":"American Federation for Aging Research","ror":"https://ror.org/000r61a05"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1553119295","https://openalex.org/W2029693536","https://openalex.org/W2070665593","https://openalex.org/W2153281696","https://openalex.org/W2181989096","https://openalex.org/W2321234954","https://openalex.org/W2525711947","https://openalex.org/W2801678809","https://openalex.org/W2942680566","https://openalex.org/W3090606066","https://openalex.org/W3094254490","https://openalex.org/W3137103045","https://openalex.org/W3190147478","https://openalex.org/W4287887716","https://openalex.org/W4292070859","https://openalex.org/W4365420849","https://openalex.org/W6760219354"],"related_works":["https://openalex.org/W4292862360","https://openalex.org/W3094096662","https://openalex.org/W2896245892","https://openalex.org/W3083074270","https://openalex.org/W2910831494","https://openalex.org/W3081452067","https://openalex.org/W4386278306","https://openalex.org/W2325849214","https://openalex.org/W3201860997","https://openalex.org/W2383459869"],"abstract_inverted_index":{"Physical":[0],"Unclonable":[1],"Functions":[2],"(PUFs)":[3],"have":[4],"been":[5],"shown":[6],"to":[7,26,34,42,75,93,175],"be":[8],"a":[9,102,111,125,150],"highly":[10],"promising":[11],"solution":[12],"for":[13,19,83,138,153],"enabling":[14],"high":[15],"security":[16,158],"systems":[17],"tailored":[18],"low-power":[20],"devices.":[21],"Commonly,":[22],"PUFs":[23],"are":[24,57],"utilised":[25],"generate":[27],"cryptographic":[28],"keys":[29,36],"on-the-fly,":[30],"replacing":[31],"the":[32,43,60,76,99,116,132,176],"need":[33],"store":[35],"in":[37,59,149],"vulnerable,":[38],"non-volatile":[39],"memories.":[40],"Due":[41],"physical":[44],"nature":[45],"of":[46,78,101,115],"PUFs,":[47],"environmental":[48],"variations":[49],"cause":[50],"noise,":[51],"manifesting":[52],"themselves":[53],"as":[54,90,110],"errors":[55],"which":[56,71],"apparent":[58],"initial":[61],"PUF":[62,86,103,106,133,179],"measurements.":[63],"This":[64,122],"necessitates":[65],"expensive":[66],"active":[67],"error":[68,94],"correction":[69,95],"techniques":[70,82],"can":[72],"run":[73],"counter":[74],"goal":[77],"lightweight":[79],"security.":[80],"ML-based":[81],"authenticating":[84],"noisy":[85],"measurements":[87],"were":[88],"explored":[89],"an":[91,139],"alternative":[92],"techniques,":[96],"bringing":[97],"about":[98],"concept":[100,135],"Phenotype,":[104],"where":[105],"identity":[107],"is":[108,163],"considered":[109],"structure":[112],"agnostic":[113],"representation":[114],"PUF,":[117],"with":[118],"relevant":[119],"noise":[120],"encoding.":[121],"work":[123],"proposes":[124],"full":[126],"noise-tolerant":[127],"authentication":[128,145],"protocol":[129],"based":[130],"on":[131],"Phenotype":[134],"and":[136,146,159],"methodology":[137],"Internet-of-Things":[140],"(IoT)":[141],"network,":[142],"demonstrating":[143],"mutual":[144],"forward":[147],"secrecy":[148],"setting":[151],"suitable":[152],"device-to-device":[154],"communication.":[155],"Upon":[156],"conducting":[157],"performance":[160],"analyses,":[161],"it":[162],"evident":[164],"that":[165],"our":[166],"proposed":[167],"scheme":[168],"demonstrates":[169],"resilience":[170],"against":[171],"various":[172],"attacks":[173],"compared":[174],"currently":[177],"existing":[178],"protocols.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
