{"id":"https://openalex.org/W7108225420","doi":"https://doi.org/10.1109/jiot.2025.3638868","title":"Feistel-PUF: Sequential Obfuscation-Based Machine Learning Attack-Resistant Physical Unclonable Function for IoT Device Security Authentication","display_name":"Feistel-PUF: Sequential Obfuscation-Based Machine Learning Attack-Resistant Physical Unclonable Function for IoT Device Security Authentication","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7108225420","doi":"https://doi.org/10.1109/jiot.2025.3638868"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3638868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3638868","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Gang Li","orcid":"https://orcid.org/0000-0001-9133-8282"},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Gang Li","raw_affiliation_strings":["College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Liangxiao Zhao","orcid":"https://orcid.org/0009-0007-7356-6848"},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangxiao Zhao","raw_affiliation_strings":["College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ziyu Zhou","orcid":"https://orcid.org/0000-0002-0792-1801"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyu Zhou","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Pengjun Wang","orcid":"https://orcid.org/0000-0002-1461-3719"},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengjun Wang","raw_affiliation_strings":["College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xuejiao Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]},{"id":"https://openalex.org/I4400573270","display_name":"Wenzhou University of Technology","ror":"https://ror.org/03dd7qj98","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573270"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuejiao Ma","raw_affiliation_strings":["School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, China","institution_ids":["https://openalex.org/I146620803","https://openalex.org/I4400573270"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuejun Zhang","orcid":"https://orcid.org/0000-0003-1132-6332"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuejun Zhang","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zhenghe Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenghe Wang","raw_affiliation_strings":["College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Electronic Engineering, Wenzhou University, Wenzhou, China","institution_ids":["https://openalex.org/I146620803"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I146620803"],"apc_list":null,"apc_paid":null,"fwci":2.1983,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91093201,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"13","issue":"4","first_page":"7388","last_page":"7402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.00019999999494757503,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":9.999999747378752e-05,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9154000282287598},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.7746000289916992},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6139000058174133},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.4296000003814697},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.413100004196167},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3824999928474426},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3815000057220459}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9154000282287598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8341000080108643},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.7746000289916992},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6139000058174133},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.4296000003814697},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41449999809265137},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.413100004196167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4077000021934509},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3824999928474426},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3815000057220459},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.36649999022483826},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36149999499320984},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.35510000586509705},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.3538999855518341},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3443000018596649},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3310999870300293},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3197000026702881},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2930999994277954},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2761000096797943},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.27469998598098755},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2709999978542328},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.25459998846054077}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3638868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3638868","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5743186473846436,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4369517068","display_name":null,"funder_award_id":"62234008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4387135662","display_name":null,"funder_award_id":"62374117","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4692831851","display_name":null,"funder_award_id":"2025C01063","funder_id":"https://openalex.org/F4320335961","funder_display_name":"National Science and Technology Planning Project"},{"id":"https://openalex.org/G7018905316","display_name":null,"funder_award_id":"62404155","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7141810030","display_name":null,"funder_award_id":"62174121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335961","display_name":"National Science and Technology Planning Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1964940342","https://openalex.org/W1972085588","https://openalex.org/W2121709560","https://openalex.org/W2295598076","https://openalex.org/W2577417592","https://openalex.org/W2752832485","https://openalex.org/W2977109867","https://openalex.org/W3094433534","https://openalex.org/W3133167475","https://openalex.org/W3136769149","https://openalex.org/W3153089393","https://openalex.org/W3157744394","https://openalex.org/W3173725123","https://openalex.org/W3177061203","https://openalex.org/W3190558739","https://openalex.org/W3202408014","https://openalex.org/W3205351141","https://openalex.org/W4207001703","https://openalex.org/W4285377667","https://openalex.org/W4285612806","https://openalex.org/W4286377434","https://openalex.org/W4293731219","https://openalex.org/W4297094550","https://openalex.org/W4308479839","https://openalex.org/W4366147501","https://openalex.org/W4381894837","https://openalex.org/W4385062315","https://openalex.org/W4385412270","https://openalex.org/W4387385657","https://openalex.org/W4387666417","https://openalex.org/W4391935809","https://openalex.org/W4392405842","https://openalex.org/W4393145816","https://openalex.org/W4399147141","https://openalex.org/W4400231897","https://openalex.org/W4404563176","https://openalex.org/W4410028585"],"related_works":[],"abstract_inverted_index":{"Device":[0],"authentication":[1,152,170],"protocols":[2],"based":[3],"on":[4,66,99,186],"a":[5,20,33,143],"strong":[6,21],"physical":[7],"unclonable":[8],"function":[9],"(PUF)":[10],"show":[11],"promise":[12],"for":[13,131],"enhancing":[14],"Internet":[15],"of":[16,58,77,96,119,199],"Things":[17],"security.":[18],"However,":[19],"PUF":[22,38,46,120],"is":[23,47],"vulnerable":[24],"to":[25,40,178,207],"machine":[26],"learning":[27],"(ML)":[28],"attacks.":[29,43],"This":[30,154,172],"paper":[31],"proposes":[32],"Feistel":[34,51,126],"structure":[35,127,177,187],"sequential":[36,59,132],"obfuscation-based":[37],"(Feistel-PUF)":[39],"resist":[41],"ML":[42,97],"When":[44],"the":[45,50,53,75,78,93,106,114,148,160,169,175,184,200],"obfuscated":[48],"by":[49,204],"structure,":[52],"challenge-response":[54,79],"relationship":[55],"resembles":[56],"that":[57,84,146],"logic":[60],"circuits.":[61],"Specifically,":[62],"each":[63],"response":[64,91,110],"depends":[65],"both":[67],"current":[68],"and":[69,117,137,164,210],"historical":[70],"challenges,":[71],"thereby":[72,112,182],"significantly":[73],"increasing":[74],"complexity":[76],"mapping.":[80],"Experimental":[81],"results":[82],"showed":[83],"even":[85],"with":[86,121,150],"1":[87],"million":[88],"collected":[89],"challenge":[90,194],"pairs,":[92],"prediction":[94],"accuracies":[95],"attacks":[98],"Feistel-PUF":[100,149],"remained":[101],"at":[102],"approximately":[103],"50%.":[104],"Notably,":[105],"obfuscation":[107,133,157,176,195],"process":[108],"excluded":[109],"data,":[111],"preserving":[113],"randomness,":[115],"reliability,":[116],"uniqueness":[118],"negligible":[122],"performance":[123],"degradation.":[124],"The":[125,197],"was":[128,202],"iteratively":[129],"reused":[130],"processing,":[134],"maintaining":[135],"constant":[136],"minimal":[138],"hardware":[139],"overhead.":[140],"We":[141],"propose":[142],"novel":[144],"approach":[145,173],"combines":[147],"an":[151],"protocol.":[153],"system":[155],"synchronizes":[156],"parameters":[158],"during":[159],"initial":[161],"registration":[162],"phase":[163],"implements":[165],"dynamic":[166,193],"updates":[167],"throughout":[168],"process.":[171],"allows":[174],"be":[179],"made":[180],"public,":[181],"overcoming":[183],"reliance":[185],"or":[188],"algorithm":[189],"secrecy":[190],"in":[191],"traditional":[192],"schemes.":[196],"security":[198,211],"protocol":[201],"confirmed":[203],"subjecting":[205],"it":[206],"ProVerif":[208],"verification":[209],"analysis.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-03T00:00:00"}
