{"id":"https://openalex.org/W4409882973","doi":"https://doi.org/10.1109/tetc.2025.3563064","title":"Design and Implementation of Cost-Effective End-to-End Authentication Protocol for PUF-Enabled IoT Devices","display_name":"Design and Implementation of Cost-Effective End-to-End Authentication Protocol for PUF-Enabled IoT Devices","publication_year":2025,"publication_date":"2025-04-28","ids":{"openalex":"https://openalex.org/W4409882973","doi":"https://doi.org/10.1109/tetc.2025.3563064"},"language":"en","primary_location":{"id":"doi:10.1109/tetc.2025.3563064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2025.3563064","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032593420","display_name":"Sourav Roy","orcid":"https://orcid.org/0000-0003-1885-3995"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sourav Roy","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur, West Bengal, India","institution_ids":["https://openalex.org/I155837530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017945178","display_name":"Mahabub Hasan Mahalat","orcid":"https://orcid.org/0000-0003-3047-236X"},"institutions":[{"id":"https://openalex.org/I193073490","display_name":"Siksha O Anusandhan University","ror":"https://ror.org/056ep7w45","country_code":"IN","type":"education","lineage":["https://openalex.org/I193073490"]},{"id":"https://openalex.org/I4210137468","display_name":"XIM University","ror":"https://ror.org/04hx99g79","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210137468"]},{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mahabub Hasan Mahalat","raw_affiliation_strings":["Department of Computer Science and Information Technology, ITER, S&#x2018;O&#x2019;A (Deemed to be University), Bhubaneswar, Odisha, India","Dept. of CS&amp;IT, ITER, S&#x2018;O&#x2019;A (Deemed to be University), Bhubaneswar, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology, ITER, S&#x2018;O&#x2019;A (Deemed to be University), Bhubaneswar, Odisha, India","institution_ids":["https://openalex.org/I4210137468","https://openalex.org/I67357951"]},{"raw_affiliation_string":"Dept. of CS&amp;IT, ITER, S&#x2018;O&#x2019;A (Deemed to be University), Bhubaneswar, India","institution_ids":["https://openalex.org/I193073490"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044215390","display_name":"Bibhash Sen","orcid":"https://orcid.org/0000-0003-4803-3074"},"institutions":[{"id":"https://openalex.org/I155837530","display_name":"National Institute of Technology Durgapur","ror":"https://ror.org/04ds0jm32","country_code":"IN","type":"education","lineage":["https://openalex.org/I155837530"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bibhash Sen","raw_affiliation_strings":["Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur, West Bengal, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, National Institute of Technology Durgapur, Durgapur, West Bengal, India","institution_ids":["https://openalex.org/I155837530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032593420"],"corresponding_institution_ids":["https://openalex.org/I155837530"],"apc_list":null,"apc_paid":null,"fwci":6.8108,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.9624374,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"13","issue":"3","first_page":"1055","last_page":"1067"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9710000157356262,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.7738590240478516},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7635555267333984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6272968053817749},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6151745319366455},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5592425465583801},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5216237306594849},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4833214282989502},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4417588412761688},{"id":"https://openalex.org/keywords/end-user","display_name":"End user","score":0.43978846073150635},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32217851281166077},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11441728472709656}],"concepts":[{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.7738590240478516},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7635555267333984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6272968053817749},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6151745319366455},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5592425465583801},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5216237306594849},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4833214282989502},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4417588412761688},{"id":"https://openalex.org/C91262260","wikidata":"https://www.wikidata.org/wiki/Q528074","display_name":"End user","level":2,"score":0.43978846073150635},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32217851281166077},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11441728472709656},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetc.2025.3563064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2025.3563064","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1524190286","https://openalex.org/W1603878273","https://openalex.org/W1966117405","https://openalex.org/W1970157653","https://openalex.org/W2000171858","https://openalex.org/W2010939995","https://openalex.org/W2044389004","https://openalex.org/W2116374153","https://openalex.org/W2128026023","https://openalex.org/W2130351941","https://openalex.org/W2145858709","https://openalex.org/W2169212403","https://openalex.org/W2508317201","https://openalex.org/W2547086787","https://openalex.org/W2583393123","https://openalex.org/W2599733330","https://openalex.org/W2609047018","https://openalex.org/W2613748018","https://openalex.org/W2801237935","https://openalex.org/W2887900476","https://openalex.org/W2888413717","https://openalex.org/W2900606647","https://openalex.org/W2914062206","https://openalex.org/W3092333758","https://openalex.org/W3094603038","https://openalex.org/W3133167475","https://openalex.org/W3179046031","https://openalex.org/W3202160163","https://openalex.org/W3203689234","https://openalex.org/W3211884787","https://openalex.org/W4241054193","https://openalex.org/W4285080292","https://openalex.org/W4285205494","https://openalex.org/W4287887716","https://openalex.org/W4293731219","https://openalex.org/W4380372387","https://openalex.org/W4385062315","https://openalex.org/W4401568250","https://openalex.org/W4404132861"],"related_works":["https://openalex.org/W4299590256","https://openalex.org/W2151749779","https://openalex.org/W3163634122","https://openalex.org/W2110442089","https://openalex.org/W2166381389","https://openalex.org/W4315785295","https://openalex.org/W2034419863","https://openalex.org/W4393280045","https://openalex.org/W2054736184","https://openalex.org/W3159728998"],"abstract_inverted_index":{"The":[0,15,51,107,122,155,170],"ubiquitous":[1],"presence":[2],"of":[3,5,12,28,59,67,114,127,137,162,173],"Internet":[4],"Things":[6],"(IoT)":[7],"prospers":[8],"in":[9,22,93],"every":[10],"aspect":[11],"human":[13],"life.":[14],"low-powered":[16],"sensors,":[17],"actuators,":[18],"and":[19,63,74,116,131,150,158,192],"mobile":[20],"devices":[21,33,89],"IoT":[23,32,88,197],"transfer":[24],"a":[25,72,99],"high":[26],"volume":[27],"security-sensitive":[29],"data.":[30],"Unmonitored":[31],"are":[34,56],"highly":[35],"susceptible":[36],"to":[37,97],"security":[38,102],"vulnerabilities.":[39],"Their":[40],"operating":[41],"environment,":[42],"with":[43,120,129],"minimal":[44],"or":[45],"no":[46],"safeguards,":[47],"allows":[48],"physical":[49],"invasion.":[50],"conventional":[52],"end-to-end":[53,76],"authentications":[54],"protocols":[55],"inadequate":[57],"because":[58],"the":[60,82,111,125,132,138,163,174],"limited":[61],"resources":[62],"ambient":[64],"working":[65],"environment":[66],"IoT.":[68],"In":[69],"this":[70],"direction,":[71],"lightweight":[73,168],"secure":[75],"authentication":[77,144],"protocol":[78,109,123,140,165,176],"is":[79,141,177],"proposed":[80,108,139,164,175],"for":[81,104],"Physically":[83],"Unclonability":[84],"Function":[85],"(PUF)":[86],"embedded":[87],"by":[90,179],"processing":[91],"them":[92],"pairs.":[94],"PUF":[95,186],"promises":[96],"be":[98],"unique":[100],"hardware-based":[101],"solution":[103],"resource-constrained":[105],"devices.":[106],"exploits":[110],"coherent":[112],"conduct":[113],"public":[115],"private":[117],"key-based":[118],"cryptosystems":[119],"PUF.":[121],"integrates":[124],"concept":[126],"ECC":[128],"ECDH":[130],"cryptographic":[133],"hash":[134],"function.":[135],"Security":[136],"validated":[142],"using":[143,183],"validation,":[145],"BAN":[146],"logic,":[147],"Scyther":[148],"tool,":[149],"against":[151],"different":[152],"adversarial":[153],"attacks.":[154],"performance":[156],"evaluation":[157,182],"extensive":[159],"comparative":[160],"study":[161],"highlight":[166],"its":[167],"feature.":[169],"practical":[171],"feasibility":[172],"verified":[178],"an":[180,184,196],"empirical":[181],"Arbiter":[185],"implemented":[187],"on":[188],"Xilinx":[189],"Spartan-3E":[190],"FPGA":[191],"Raspberry":[193],"Pi":[194],"as":[195],"device.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
