{"id":"https://openalex.org/W4391235388","doi":"https://doi.org/10.1109/jsyst.2024.3351222","title":"CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices","display_name":"CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices","publication_year":2024,"publication_date":"2024-01-25","ids":{"openalex":"https://openalex.org/W4391235388","doi":"https://doi.org/10.1109/jsyst.2024.3351222"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2024.3351222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2024.3351222","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042814178","display_name":"Chao Shang","orcid":"https://orcid.org/0000-0002-1428-1339"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Shang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101850333","display_name":"Jin Cao","orcid":"https://orcid.org/0000-0003-1372-7252"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Cao","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013500083","display_name":"Tong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Zhu","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100629240","display_name":"Yinghui Zhang","orcid":"https://orcid.org/0000-0002-5764-3272"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghui Zhang","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi&#x0027;an University of Posts &amp; Telecommunications, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi&#x0027;an University of Posts &amp; Telecommunications, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036725114","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0003-2898-7495"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ben Niu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042814178"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":9.7421,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.97867035,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"18","issue":"1","first_page":"590","last_page":"599"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.6693795919418335},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6483471989631653},{"id":"https://openalex.org/keywords/skew","display_name":"Skew","score":0.6337102651596069},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5842653512954712},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5433377623558044},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.47146397829055786},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.46325692534446716},{"id":"https://openalex.org/keywords/clock-skew","display_name":"Clock skew","score":0.42288118600845337},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4143002927303314},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3859121799468994},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3333497643470764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22699424624443054},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14347350597381592},{"id":"https://openalex.org/keywords/clock-signal","display_name":"Clock signal","score":0.09928372502326965},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09784650802612305},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08271250128746033},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.059968382120132446}],"concepts":[{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.6693795919418335},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6483471989631653},{"id":"https://openalex.org/C43711488","wikidata":"https://www.wikidata.org/wiki/Q7534783","display_name":"Skew","level":2,"score":0.6337102651596069},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5842653512954712},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5433377623558044},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.47146397829055786},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.46325692534446716},{"id":"https://openalex.org/C60501442","wikidata":"https://www.wikidata.org/wiki/Q4382014","display_name":"Clock skew","level":4,"score":0.42288118600845337},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4143002927303314},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3859121799468994},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3333497643470764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22699424624443054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14347350597381592},{"id":"https://openalex.org/C137059387","wikidata":"https://www.wikidata.org/wiki/Q426882","display_name":"Clock signal","level":3,"score":0.09928372502326965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09784650802612305},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08271250128746033},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.059968382120132446},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2024.3351222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2024.3351222","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2207847045","display_name":null,"funder_award_id":"U23B2024","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4687489897","display_name":null,"funder_award_id":"62172317","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8145832166","display_name":null,"funder_award_id":"62102298","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1525967479","https://openalex.org/W1978973474","https://openalex.org/W1992025965","https://openalex.org/W2000171858","https://openalex.org/W2011728129","https://openalex.org/W2029594338","https://openalex.org/W2033443176","https://openalex.org/W2070074868","https://openalex.org/W2078569392","https://openalex.org/W2098621209","https://openalex.org/W2099613071","https://openalex.org/W2104599106","https://openalex.org/W2146244799","https://openalex.org/W2151043249","https://openalex.org/W2151759197","https://openalex.org/W2157549033","https://openalex.org/W2169212403","https://openalex.org/W2289689155","https://openalex.org/W2472201937","https://openalex.org/W2529194337","https://openalex.org/W2533948235","https://openalex.org/W2574536453","https://openalex.org/W2734401556","https://openalex.org/W2736210006","https://openalex.org/W2771446126","https://openalex.org/W2891699316","https://openalex.org/W2903982230","https://openalex.org/W2907410281","https://openalex.org/W2953381066","https://openalex.org/W2983028905","https://openalex.org/W2985766404","https://openalex.org/W3022162203","https://openalex.org/W3090352825","https://openalex.org/W3101877327","https://openalex.org/W3127763944","https://openalex.org/W4214670577","https://openalex.org/W6752329813"],"related_works":["https://openalex.org/W4232019485","https://openalex.org/W2156857157","https://openalex.org/W4389371618","https://openalex.org/W2028052815","https://openalex.org/W2076413498","https://openalex.org/W2164834710","https://openalex.org/W3014822659","https://openalex.org/W2123512677","https://openalex.org/W2117826006","https://openalex.org/W4327499872"],"abstract_inverted_index":{"The":[0,94],"Class-1":[1,48,77,152],"Internet":[2],"of":[3,12,15,40,64,131,138],"Things":[4],"(IoT)":[5],"device":[6,91,146],"is":[7,44,125,149],"difficult":[8],"to":[9,28],"protect":[10,29],"because":[11],"the":[13,38,58,62,100,121],"lack":[14],"minimal":[16,41],"hardware":[17],"and":[18,116,145,148],"extension":[19],"support.":[20],"Researchers":[21],"have":[22],"proposed":[23,122],"several":[24],"remote":[25,34,143],"attestation":[26,35,144],"schemes":[27],"IoT":[30,49,78,153],"devices.":[31,50,65,154],"However,":[32],"hardware-assisted":[33],"methods":[36,54],"require":[37],"support":[39],"hardware,":[42],"which":[43],"not":[45,85],"suitable":[46],"for":[47,76,151],"And":[51,120],"regular":[52],"software-based":[53],"can":[55],"only":[56,86],"verify":[57],"integrity":[59,92],"rather":[60],"than":[61],"identity":[63,73,87],"In":[66],"this":[67],"article,":[68],"we":[69],"propose":[70],"a":[71,128],"new":[72],"authentication":[74,88,123],"scheme":[75],"devices":[79],"based":[80],"on":[81,127],"clock":[82],"skew,":[83],"achieving":[84,135],"but":[89],"also":[90],"verification.":[93],"formal":[95],"verification":[96],"results":[97],"by":[98],"employing":[99],"Tamarin":[101],"tool":[102],"show":[103],"that":[104],"our":[105],"protocol":[106,124],"achieves":[107],"mutual":[108],"authentication,":[109],"man-in-the-middle":[110],"attack":[111,114,118],"resistance,":[112,115],"replay":[113],"counterfeit":[117],"resistance.":[119],"evaluated":[126],"small":[129],"cluster":[130],"Arduino":[132],"Mega":[133],"boards,":[134],"100%":[136],"accuracy":[137],"identification.":[139],"Our":[140],"work":[141],"combines":[142],"fingerprint":[147],"fit":[150]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
