{"id":"https://openalex.org/W2920413639","doi":"https://doi.org/10.1109/jiot.2019.2896751","title":"Guest Editorial Special Issue on Intrinsic Hardware Security for Internet of Things Infrastructure","display_name":"Guest Editorial Special Issue on Intrinsic Hardware Security for Internet of Things Infrastructure","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2920413639","doi":"https://doi.org/10.1109/jiot.2019.2896751","mag":"2920413639"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2896751","pdf_url":"https://ieeexplore.ieee.org/ielx7/6488907/8651406/08651432.pdf","source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2372-2541","2327-4662"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"editorial","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/6488907/8651406/08651432.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043831663","display_name":"Mohamed Kheir","orcid":"https://orcid.org/0000-0002-6540-0908"},"institutions":[],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mohamed Kheir","raw_affiliation_string":"IMS Connector Systems Group, Baden-W\u00fcrttemberg, Germany","raw_affiliation_strings":["IMS Connector Systems Group, Baden-W\u00fcrttemberg, Germany"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055827474","display_name":"Manos M. Tentzeris","orcid":"https://orcid.org/0000-0003-0476-3577"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I1289702989","https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manos M. Tentzeris","raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037514714","display_name":"Ahmed Abdelgawad","orcid":"https://orcid.org/0000-0002-6655-2065"},"institutions":[{"id":"https://openalex.org/I1629065","display_name":"Central Michigan University","ror":"https://ror.org/02xawj266","country_code":"US","type":"education","lineage":["https://openalex.org/I1629065"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Abdelgawad","raw_affiliation_string":"School of Engineering and Technology, Central Michigan University, Mount Pleasant, MI, USA","raw_affiliation_strings":["School of Engineering and Technology, Central Michigan University, Mount Pleasant, MI, USA"]},{"author_position":"last","author":{"id":"https://openalex.org/A5017792460","display_name":"Ilsun You","orcid":"https://orcid.org/0000-0002-0604-3445"},"institutions":[{"id":"https://openalex.org/I24541011","display_name":"Soonchunhyang University","ror":"https://ror.org/03qjsrb10","country_code":"KR","type":"education","lineage":["https://openalex.org/I24541011"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ilsun You","raw_affiliation_string":"Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea#TAB#","raw_affiliation_strings":["Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea#TAB#"]}],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":1,"cited_by_percentile_year":{"min":68,"max":75},"biblio":{"volume":"6","issue":"1","first_page":"321","last_page":"324"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Hardware Security and Authentication Techniques","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Hardware Security and Authentication Techniques","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Memristive Devices for Neuromorphic Computing","score":0.9605,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14117","display_name":"Failure Analysis of Integrated Circuits","score":0.9412,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"intrinsic hardware security","score":0.6946},{"keyword":"things infrastructure","score":0.4134}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7866951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7310561},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.696061},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5991107},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.56408745},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5035154},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4395345},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40341538},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.37569842},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2896751","pdf_url":"https://ieeexplore.ieee.org/ielx7/6488907/8651406/08651432.pdf","source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2372-2541","2327-4662"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2896751","pdf_url":"https://ieeexplore.ieee.org/ielx7/6488907/8651406/08651432.pdf","source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2372-2541","2327-4662"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.63}],"grants":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4317795068","https://openalex.org/W4387497383","https://openalex.org/W3173606202","https://openalex.org/W2948807893","https://openalex.org/W3183948672","https://openalex.org/W2778153218","https://openalex.org/W3110381201","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2935909890"],"ngrams_url":"https://api.openalex.org/works/W2920413639/ngrams","abstract_inverted_index":{"Internet":[0],"of":[1,12,19,37,81,124],"Things":[2],"(IoT)":[3],"is":[4,128],"an":[5],"emerging":[6],"technology":[7],"in":[8,136],"the":[9,78,92,119,133,141],"modern":[10],"era":[11],"big":[13],"data.":[14],"It":[15],"concerns":[16],"a":[17,73,110],"variety":[18],"applications":[20],"ranging":[21],"from":[22,140],"smart":[23,28],"homes,":[24],"connected":[25,38],"vehicles":[26],"to":[27,63,76,95,129],"factories,":[29],"and":[30,40,44,47,51,57,98],"more.":[31],"IoT":[32,65,113,120,138],"infrastructure":[33,114,139],"typically":[34],"comprises":[35],"millions":[36],"objects":[39],"devices":[41],"that":[42],"store":[43],"exchange":[45],"sensitive":[46],"confidential":[48],"information.":[49],"Theft":[50],"fraud":[52],"scenarios,":[53],"such":[54,64],"as":[55,115],"hacking":[56],"identity":[58],"forgery,":[59],"are":[60,90,107],"serious":[61],"threats":[62],"devices.":[66],"Embedded":[67],"hardware":[68,104],"security":[69,82,97,105],"techniques":[70,106],"could":[71],"be":[72],"potential":[74,93],"solution":[75,94],"preserve":[77],"highest":[79],"level":[80],"within":[83],"this":[84,125],"infrastructure.":[85],"Physically":[86],"unclonable":[87],"functions":[88],"(PUFs)":[89],"among":[91],"data":[96],"counterfeiting":[99],"problems.":[100],"Many":[101],"more":[102],"intrinsic":[103],"underway":[108],"for":[109],"highly":[111],"secure":[112],"strongly":[116],"demanded":[117],"by":[118],"community.":[121],"The":[122],"focus":[123],"Special":[126],"Issue":[127],"provide":[130],"readers":[131],"with":[132],"latest":[134],"advances":[135],"securing":[137],"physical":[142],"layer":[143],"point-of-view.":[144]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2920413639","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-02-29T19:58:26.781704","created_date":"2019-03-11"}