{"id":"https://openalex.org/W2804816325","doi":"https://doi.org/10.1109/iwcmc.2018.8450341","title":"A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions","display_name":"A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2804816325","doi":"https://doi.org/10.1109/iwcmc.2018.8450341","mag":"2804816325"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2018.8450341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2018.8450341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1805.06980","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052731401","display_name":"Ashwija Reddy Korenda","orcid":null},"institutions":[{"id":"https://openalex.org/I203172682","display_name":"Northern Arizona University","ror":"https://ror.org/0272j5188","country_code":"US","type":"education","lineage":["https://openalex.org/I203172682"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ashwija Reddy Korenda","raw_affiliation_strings":["School of Informatics, Northern Arizona University, Flagstaff, AZ","School of Informatics, Northern Arizona University, Flagstaff, AZ, 86011"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Northern Arizona University, Flagstaff, AZ","institution_ids":["https://openalex.org/I203172682"]},{"raw_affiliation_string":"School of Informatics, Northern Arizona University, Flagstaff, AZ, 86011","institution_ids":["https://openalex.org/I203172682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035395012","display_name":"Fatemeh Afghah","orcid":"https://orcid.org/0000-0002-2315-1173"},"institutions":[{"id":"https://openalex.org/I203172682","display_name":"Northern Arizona University","ror":"https://ror.org/0272j5188","country_code":"US","type":"education","lineage":["https://openalex.org/I203172682"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fatemeh Afghah","raw_affiliation_strings":["School of Informatics, Northern Arizona University, Flagstaff, AZ","School of Informatics, Northern Arizona University, Flagstaff, AZ, 86011"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Northern Arizona University, Flagstaff, AZ","institution_ids":["https://openalex.org/I203172682"]},{"raw_affiliation_string":"School of Informatics, Northern Arizona University, Flagstaff, AZ, 86011","institution_ids":["https://openalex.org/I203172682"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064958109","display_name":"Bertrand Cambou","orcid":"https://orcid.org/0000-0001-9272-6527"},"institutions":[{"id":"https://openalex.org/I203172682","display_name":"Northern Arizona University","ror":"https://ror.org/0272j5188","country_code":"US","type":"education","lineage":["https://openalex.org/I203172682"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bertrand Cambou","raw_affiliation_strings":["School of Informatics, Northern Arizona University, Flagstaff, AZ","School of Informatics, Northern Arizona University, Flagstaff, AZ, 86011"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Northern Arizona University, Flagstaff, AZ","institution_ids":["https://openalex.org/I203172682"]},{"raw_affiliation_string":"School of Informatics, Northern Arizona University, Flagstaff, AZ, 86011","institution_ids":["https://openalex.org/I203172682"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5052731401"],"corresponding_institution_ids":["https://openalex.org/I203172682"],"apc_list":null,"apc_paid":null,"fwci":0.5263,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.61568855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1261","last_page":"1266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.7546002268791199},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7357553243637085},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.5646135807037354},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5171615481376648},{"id":"https://openalex.org/keywords/resistive-random-access-memory","display_name":"Resistive random-access memory","score":0.50581955909729},{"id":"https://openalex.org/keywords/bch-code","display_name":"BCH code","score":0.4761119782924652},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.47594380378723145},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4130604565143585},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.355925977230072},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34443119168281555},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.22452670335769653},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14605951309204102},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1299743950366974},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.08908328413963318}],"concepts":[{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.7546002268791199},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7357553243637085},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.5646135807037354},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5171615481376648},{"id":"https://openalex.org/C182019814","wikidata":"https://www.wikidata.org/wiki/Q1143830","display_name":"Resistive random-access memory","level":3,"score":0.50581955909729},{"id":"https://openalex.org/C42276685","wikidata":"https://www.wikidata.org/wiki/Q795705","display_name":"BCH code","level":3,"score":0.4761119782924652},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.47594380378723145},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4130604565143585},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.355925977230072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34443119168281555},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.22452670335769653},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14605951309204102},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1299743950366974},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.08908328413963318},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/iwcmc.2018.8450341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2018.8450341","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 14th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1805.06980","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1805.06980","pdf_url":"https://arxiv.org/pdf/1805.06980","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2804816325","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1805.06980.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1805.06980","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1805.06980","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1805.06980","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1805.06980","pdf_url":"https://arxiv.org/pdf/1805.06980","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.6200000047683716,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1921186091","https://openalex.org/W1922829621","https://openalex.org/W1988614714","https://openalex.org/W2010094857","https://openalex.org/W2111865441","https://openalex.org/W2150498905","https://openalex.org/W2169212403","https://openalex.org/W2174648984","https://openalex.org/W2327503419","https://openalex.org/W2395872832","https://openalex.org/W2613354819","https://openalex.org/W2722956734","https://openalex.org/W6600302432","https://openalex.org/W6606788112","https://openalex.org/W6633857295","https://openalex.org/W6666570405","https://openalex.org/W6681749759","https://openalex.org/W6724876870","https://openalex.org/W6747861003"],"related_works":["https://openalex.org/W2894075708","https://openalex.org/W2739497507","https://openalex.org/W2913539857","https://openalex.org/W2014909897","https://openalex.org/W2750206561","https://openalex.org/W3008711827","https://openalex.org/W1970948544","https://openalex.org/W3014074124","https://openalex.org/W3203135359","https://openalex.org/W3197528249","https://openalex.org/W2394837703","https://openalex.org/W2580975807","https://openalex.org/W2971824249","https://openalex.org/W2937689900","https://openalex.org/W2978421645","https://openalex.org/W2014299685","https://openalex.org/W2605404001","https://openalex.org/W2964375637","https://openalex.org/W2921947805","https://openalex.org/W3169020846"],"abstract_inverted_index":{"Some":[0],"of":[1,12,124,166,181,239],"the":[2,16,28,33,40,52,69,74,79,122,127,131,149,153,198],"main":[3,113],"challenges":[4],"towards":[5],"utilizing":[6,176],"conventional":[7],"cryptographic":[8],"techniques":[9],"in":[10,73,78,115,140,197],"Internet":[11],"Things":[13],"(IoT)":[14],"include":[15],"need":[17],"for":[18,22,65,105],"generating":[19,167],"secret":[20,59,109,128],"keys":[21,30,96,129,151,170],"such":[23],"a":[24,57,98,177,189,220],"large-scale":[25],"network,":[26],"distributing":[27],"generated":[29,150],"to":[31,42,51,93,172,213],"all":[32],"devices,":[34],"key":[35,60,110,118],"storage":[36],"as":[37,39],"well":[38],"vulnerability":[41],"security":[43],"attacks":[44],"when":[45,188,219],"an":[46],"adversary":[47],"gets":[48],"physical":[49],"access":[50],"devices.":[53],"In":[54],"this":[55,141],"paper,":[56],"novel":[58],"generation":[61,119],"method":[62],"is":[63,91,121,164,195,203,233],"proposed":[64,92,139,162,199],"IoTs":[66],"that":[67,160],"utilize":[68],"intrinsic":[70],"randomness":[71],"embedded":[72],"devices'":[75],"memories":[76],"introduced":[77],"manufacturing":[80],"process.":[81],"A":[82],"fuzzy":[83,137,200],"extractor":[84,138,201],"structure":[85,202],"using":[86],"serially":[87],"concatenated":[88],"BCHPolar":[89],"codes":[90],"generate":[94],"reproducible":[95],"from":[97,130],"ReRAM-based":[99],"ternary-state":[100],"Physical":[101],"Unclonable":[102],"Functions":[103],"(PUFs)":[104],"device":[106],"authentication":[107],"and":[108,152],"generation.":[111],"The":[112,136,156,185],"concern":[114],"deploying":[116],"PUF-based":[117],"methods":[120],"leakage":[123],"information":[125,147],"about":[126],"publicly":[132],"available":[133],"helper":[134,154,182],"data.":[135,155],"paper":[142],"ensures":[143],"much":[144],"less":[145],"mutual":[146],"between":[148],"experimental":[157],"results":[158],"show":[159],"our":[161],"scheme":[163],"capable":[165],"notably":[168],"stronger":[169],"compared":[171],"existing":[173],"techniques,":[174],"while":[175],"significantly":[178],"lower":[179],"number":[180],"data":[183],"bits.":[184],"failure":[186],"probability":[187],"low":[190],"complex":[191,221],"Successive":[192],"Cancellation":[193],"decoder":[194,225],"implemented":[196],"10":[204,214],"<sup":[205,215,228],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[206,216,229],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-8</sup>":[207],",":[208,218],"which":[209],"was":[210,226],"further":[211],"increased":[212],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-10</sup>":[217],"iterative":[222],"belief":[223],"propagation":[224],"used.":[227],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">11</sup>":[230],"This":[231],"project":[232],"partially":[234],"supported":[235],"by":[236],"Arizona":[237],"Board":[238],"Regents":[240],"under":[241],"Grant":[242],"#":[243],"1003330.":[244]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
