{"id":"https://openalex.org/W4391164093","doi":"https://doi.org/10.1109/jiot.2024.3358011","title":"Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection","display_name":"Building PUF as a Service: Distributed Authentication and Recoverable Data Sharing With Multidimensional CRPs Security Protection","publication_year":2024,"publication_date":"2024-01-24","ids":{"openalex":"https://openalex.org/W4391164093","doi":"https://doi.org/10.1109/jiot.2024.3358011"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3358011","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3358011","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://discovery.ucl.ac.uk/10190812/1/Building_PUF_as_a_Service_Distributed_Authentication_and_Recoverable_Data_Sharing_With_Multidimensional_CRPs_Security_Protection.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037850287","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0003-2092-2195"},"institutions":[{"id":"https://openalex.org/I4210144214","display_name":"Jiangsu University of Technology","ror":"https://ror.org/04jabhf80","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210144214"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["School of Computer Engineering, Jiangsu University of Technology, Changzhou, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Jiangsu University of Technology, Changzhou, Jiangsu, China","institution_ids":["https://openalex.org/I4210144214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100661842","display_name":"Bing Li","orcid":"https://orcid.org/0000-0003-2150-418X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bing Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100461646","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0002-3603-6617"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039083160","display_name":"Jinke Chang","orcid":"https://orcid.org/0000-0002-8335-1337"},"institutions":[{"id":"https://openalex.org/I1289784979","display_name":"University College Hospital","ror":"https://ror.org/00wrevg56","country_code":"GB","type":"healthcare","lineage":["https://openalex.org/I1289784979","https://openalex.org/I1340918713"]},{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jinke Chang","raw_affiliation_strings":["UCL Faculty of Medical Sciences, University College London, London, U.K"],"affiliations":[{"raw_affiliation_string":"UCL Faculty of Medical Sciences, University College London, London, U.K","institution_ids":["https://openalex.org/I1289784979","https://openalex.org/I45129253"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037850287"],"corresponding_institution_ids":["https://openalex.org/I4210144214"],"apc_list":null,"apc_paid":null,"fwci":3.861,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.94258314,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"11","issue":"10","first_page":"17301","last_page":"17316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.818234920501709},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6388300061225891},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6093142032623291},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.5214959383010864},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5069558620452881},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43173301219940186},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12513279914855957},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08943450450897217}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.818234920501709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6388300061225891},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6093142032623291},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.5214959383010864},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5069558620452881},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43173301219940186},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12513279914855957},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08943450450897217},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2024.3358011","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3358011","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10190812","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10190812/","pdf_url":"https://discovery.ucl.ac.uk/10190812/1/Building_PUF_as_a_Service_Distributed_Authentication_and_Recoverable_Data_Sharing_With_Multidimensional_CRPs_Security_Protection.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"   IEEE Internet of Things Journal       (2024)     (In press).  ","raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:eprints.ucl.ac.uk.OAI2:10190812","is_oa":true,"landing_page_url":"https://discovery.ucl.ac.uk/id/eprint/10190812/","pdf_url":"https://discovery.ucl.ac.uk/10190812/1/Building_PUF_as_a_Service_Distributed_Authentication_and_Recoverable_Data_Sharing_With_Multidimensional_CRPs_Security_Protection.pdf","source":{"id":"https://openalex.org/S4306400024","display_name":"UCL Discovery (University College London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45129253","host_organization_name":"University College London","host_organization_lineage":["https://openalex.org/I45129253"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"   IEEE Internet of Things Journal       (2024)     (In press).  ","raw_type":"Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5435203463","display_name":null,"funder_award_id":"62174150","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391164093.pdf","grobid_xml":"https://content.openalex.org/works/W4391164093.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1970606468","https://openalex.org/W1973404937","https://openalex.org/W2084652510","https://openalex.org/W2105114022","https://openalex.org/W2141420453","https://openalex.org/W2178241506","https://openalex.org/W2609047018","https://openalex.org/W2801237935","https://openalex.org/W2805592916","https://openalex.org/W2811168394","https://openalex.org/W2898459335","https://openalex.org/W2964101012","https://openalex.org/W2969883781","https://openalex.org/W2977247807","https://openalex.org/W2980561852","https://openalex.org/W3006809229","https://openalex.org/W3007112828","https://openalex.org/W3009034279","https://openalex.org/W3014191751","https://openalex.org/W3045336918","https://openalex.org/W3080962733","https://openalex.org/W3083387057","https://openalex.org/W3130731369","https://openalex.org/W3132299465","https://openalex.org/W3133167475","https://openalex.org/W3136108810","https://openalex.org/W3136769149","https://openalex.org/W3164410235","https://openalex.org/W3216767138","https://openalex.org/W4210920881","https://openalex.org/W4213213499","https://openalex.org/W4287887716","https://openalex.org/W4312841355","https://openalex.org/W4365421065"],"related_works":["https://openalex.org/W2955195711","https://openalex.org/W2354454611","https://openalex.org/W2993266126","https://openalex.org/W2392283887","https://openalex.org/W2351388597","https://openalex.org/W2939925694","https://openalex.org/W2829881200","https://openalex.org/W4241986464","https://openalex.org/W2184647741","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Physically":[0],"Unclonable":[1],"Functions":[2],"(PUFs)":[3],"have":[4],"emerged":[5],"as":[6,24],"hardware":[7],"fingerprints":[8],"for":[9,247],"IoT":[10,248],"devices":[11],"in":[12,129,166],"the":[13,55,94,130,152,155,183],"form":[14],"of":[15,31,57,87,154,214],"challenge-response":[16],"pairs":[17],"(CRPs).":[18],"This":[19,108],"mapping":[20],"behaviour":[21],"is":[22,127,145,242],"regarded":[23],"a":[25,101,141,221],"physically":[26],"secure":[27,175],"primitive,":[28],"activating":[29],"mechanisms":[30],"authentication":[32,200],"and":[33,50,90,103,112,122,136,158,181,192,201,212,230,235,245],"data":[34,203],"protection.":[35,208],"However,":[36],"multidimensional":[37,206],"security":[38,162,210],"threats":[39],"to":[40,74,83,117,133,150,173,226],"CRPs,":[41],"including":[42],"impersonation":[43],"attacks,":[44,46,49],"availability":[45],"machine":[47],"learning":[48],"single":[51],"point":[52],"failure,":[53],"impede":[54],"applications":[56],"PUFs":[58],"technology.":[59],"To":[60],"simultaneously":[61],"solve":[62],"these":[63],"threats,":[64],"this":[65],"paper":[66],"not":[67],"only":[68],"leverages":[69,110],"Shamir":[70],"secret":[71],"sharing":[72,138,204],"(SSS)":[73],"provide":[75],"comprehensive":[76],"CRPs":[77,105,119,135,189,207],"protection,":[78],"but":[79],"also":[80,218],"integrates":[81],"blockchain":[82,126,149],"address":[84],"trust":[85],"issues":[86],"synchronization,":[88],"supervision,":[89],"deployment":[91],"brought":[92],"by":[93],"SSS":[95,111,131,156,179],"system.":[96],"Specifically,":[97],"we":[98,195],"first":[99],"propose":[100],"security-enhanced":[102],"reliable":[104],"management":[106,190],"method.":[107],"method":[109,191],"its":[113],"homomorphic":[114],"addition":[115],"feature":[116],"protect":[118],"storage,":[120],"sharing,":[121],"backup":[123],"processes.":[124],"Meanwhile,":[125],"involved":[128],"system":[132,157,180],"synchronize":[134],"supervise":[137],"behaviours.":[139],"Then,":[140],"PUF-as-a-service":[142],"(PaaS)":[143],"framework":[144],"constructed,":[146],"which":[147],"utilizes":[148],"trace":[151],"change":[153],"integrate":[159],"different":[160],"PUFs-based":[161,198],"mechanisms.":[163],"Once":[164],"deployed":[165],"PaaS,":[167],"users":[168],"can":[169],"always":[170],"utilize":[171],"transactions":[172],"build":[174],"on-chain":[176],"channels":[177],"with":[178,205],"employ":[182],"PUF":[184],"service.":[185],"Based":[186],"on":[187],"our":[188,215,240],"PaaS":[193],"framework,":[194],"successfully":[196],"constructed":[197],"distributed":[199],"recoverable":[202],"The":[209,233],"proof":[211],"discussions":[213,237],"scheme":[216],"are":[217],"provided.":[219],"Moreover,":[220],"proof-of-concept":[222],"prototype":[223],"was":[224],"implemented":[225],"conduct":[227],"experimental":[228],"evaluations":[229],"comparative":[231],"analysis.":[232],"results":[234],"additional":[236],"demonstrate":[238],"that":[239],"work":[241],"efficient,":[243],"practical,":[244],"suitable":[246],"deployment.":[249]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
