{"id":"https://openalex.org/W4412082731","doi":"https://doi.org/10.1109/host64725.2025.11050065","title":"Sourcing Trust From Peers with Physical Unclonable Functions","display_name":"Sourcing Trust From Peers with Physical Unclonable Functions","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4412082731","doi":"https://doi.org/10.1109/host64725.2025.11050065"},"language":"en","primary_location":{"id":"doi:10.1109/host64725.2025.11050065","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host64725.2025.11050065","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016174304","display_name":"Md Sadman Siraj","orcid":"https://orcid.org/0000-0002-1391-5774"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Sadman Siraj","raw_affiliation_strings":["University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA"],"affiliations":[{"raw_affiliation_string":"University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA","institution_ids":["https://openalex.org/I169521973"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045349695","display_name":"Aisha B Rahman","orcid":"https://orcid.org/0000-0002-1802-484X"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aisha B Rahman","raw_affiliation_strings":["University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA"],"affiliations":[{"raw_affiliation_string":"University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA","institution_ids":["https://openalex.org/I169521973"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071819177","display_name":"Cyrus Minwalla","orcid":"https://orcid.org/0000-0002-9569-664X"},"institutions":[{"id":"https://openalex.org/I898769471","display_name":"Bank of Canada","ror":"https://ror.org/05cc98565","country_code":"CA","type":"funder","lineage":["https://openalex.org/I898769471"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Cyrus Minwalla","raw_affiliation_strings":["Financial Technology Research, Bank of Canada,Ottawa,ON,Canada"],"affiliations":[{"raw_affiliation_string":"Financial Technology Research, Bank of Canada,Ottawa,ON,Canada","institution_ids":["https://openalex.org/I898769471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000446559","display_name":"Eirini Eleni Tsiropoulou","orcid":"https://orcid.org/0000-0003-1322-1876"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eirini Eleni Tsiropoulou","raw_affiliation_strings":["University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA"],"affiliations":[{"raw_affiliation_string":"University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA","institution_ids":["https://openalex.org/I169521973"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029774084","display_name":"Jim Plusquellic","orcid":"https://orcid.org/0000-0002-1876-117X"},"institutions":[{"id":"https://openalex.org/I169521973","display_name":"University of New Mexico","ror":"https://ror.org/05fs6jp91","country_code":"US","type":"education","lineage":["https://openalex.org/I169521973"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jim Plusquellic","raw_affiliation_strings":["University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA"],"affiliations":[{"raw_affiliation_string":"University of New Mexico,Department of Electrical and Computer Engineering,Albuquerque,NM,USA","institution_ids":["https://openalex.org/I169521973"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016174304"],"corresponding_institution_ids":["https://openalex.org/I169521973"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20837513,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"268","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11953","display_name":"Neuroethics, Human Enhancement, Biomedical Innovations","score":0.9555000066757202,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.6771811842918396},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4933389723300934},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47242605686187744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4127254784107208},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.35829365253448486},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3267315626144409}],"concepts":[{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.6771811842918396},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4933389723300934},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47242605686187744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4127254784107208},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.35829365253448486},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3267315626144409}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host64725.2025.11050065","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host64725.2025.11050065","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W4386278306","https://openalex.org/W2010558539","https://openalex.org/W2580259249","https://openalex.org/W3096667951","https://openalex.org/W4288068867","https://openalex.org/W102880045","https://openalex.org/W2594513438","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Traditional":[0],"authentication":[1,16,27,39,58,123,181],"schemes":[2],"rely":[3],"heavily":[4],"on":[5,77,112,148,176,221],"trusted":[6,98],"third":[7],"parties":[8,46,68],"that":[9,80],"act":[10],"as":[11],"certificate":[12],"authorities":[13],"to":[14,126,138,165,179,213],"source":[15],"credentials.":[17],"In":[18],"this":[19],"paper,":[20],"we":[21],"describe":[22],"an":[23,73],"offline,":[24],"end-to-end":[25],"mutual":[26],"and":[28,40,48,57,162,210],"session":[29,41],"key":[30,42],"generation":[31,43],"protocol,":[32],"called":[33],"PUF-based":[34],"Peer":[35],"Trust":[36,65],"(PPT),":[37],"where":[38],"between":[44],"two":[45],"(Alice":[47],"Bob)":[49],"is":[50,69,132,189,218],"implemented":[51],"using":[52,106,192],"physical":[53],"unclonable":[54],"functions":[55],"(PUFs)":[56],"information":[59,141,223],"from":[60,100],"neighboring":[61],"peer":[62,90,121],"devices":[63],"(Charlies).":[64],"among":[66],"the":[67,82,101,160,168,172,187,204,207],"established":[70],"by":[71,86,225],"defining":[72],"effort-reward":[74],"model":[75,188],"based":[76,111,147,175,220],"Contract":[78],"Theory":[79],"leverages":[81],"trust":[83,122,149,155,169],"beliefs":[84],"provided":[85,224],"a":[87,95,107,120,144,153,193],"set":[88,96,102,194],"of":[89,97,103,171,186,195,206],"devices.":[91],"Alice":[92,128,151],"autonomously":[93],"selects":[94],"Teds":[99,117,135,174],"untrusted":[104],"Charlies":[105,161],"reinforcement":[108],"learning":[109],"algorithm":[110],"Stochastic":[113],"Learning":[114],"Automata.":[115],"These":[116],"participate":[118],"in":[119],"process":[124],"designed":[125],"help":[127],"decide":[129,215],"if":[130,216],"Bob":[131,217],"trustworthy.":[133],"The":[134],"are":[136,201],"incentivized":[137],"provide":[139],"accurate":[140],"(effort)":[142],"via":[143],"reward":[145],"system":[146],"scores.":[150],"computes":[152],"personalized":[154],"belief":[156],"distribution":[157],"for":[158],"all":[159],"utilizes":[163],"it":[164],"eventually":[166],"update":[167],"scores":[170],"selected":[173],"their":[177],"contribution":[178],"Bob's":[180],"process.":[182],"An":[183],"experimental":[184],"evaluation":[185],"carried":[190],"out":[191],"PUF-instantiated":[196],"FPGAs.":[197],"Detailed":[198],"numerical":[199],"results":[200],"presented":[202],"demonstrating":[203],"effectiveness":[205],"proposed":[208],"scheme":[209],"its":[211],"ability":[212],"correctly":[214],"trustworthy":[219],"incomplete":[222],"peers.":[226]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
