{"id":"https://openalex.org/W4229076093","doi":"https://doi.org/10.1145/3507657.3529656","title":"MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions","display_name":"MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4229076093","doi":"https://doi.org/10.1145/3507657.3529656"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3529656","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3529656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.tue.nl/ws/files/370914657/3507657.3529656.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034712757","display_name":"Omar Adel Ibrahim","orcid":"https://orcid.org/0000-0002-0171-8757"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Omar Adel Ibrahim","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088679207","display_name":"Savio Sciancalepore","orcid":"https://orcid.org/0000-0003-0974-3639"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Savio Sciancalepore","raw_affiliation_strings":["Eindhoven University of Technology (TU/e), Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology (TU/e), Eindhoven, Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034712757"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":0.4666,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58152076,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"290","last_page":"291"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9799000024795532,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.8279778957366943},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.788611650466919},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7258291244506836},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6730111837387085},{"id":"https://openalex.org/keywords/arduino","display_name":"Arduino","score":0.5462486743927002},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.49151620268821716},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42142927646636963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3936852514743805},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31976577639579773}],"concepts":[{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.8279778957366943},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.788611650466919},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7258291244506836},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6730111837387085},{"id":"https://openalex.org/C136501162","wikidata":"https://www.wikidata.org/wiki/Q175957","display_name":"Arduino","level":2,"score":0.5462486743927002},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.49151620268821716},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42142927646636963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3936852514743805},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31976577639579773},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3507657.3529656","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3529656","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:publications/3bfb4870-8458-4c6b-8f76-9aa326552daa","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/3bfb4870-8458-4c6b-8f76-9aa326552daa","pdf_url":"https://pure.tue.nl/ws/files/370914657/3507657.3529656.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ibrahim, O A, Sciancalepore, S & Di Pietro, R 2022, MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. in WiSec '22 : Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc., New York, pp. 290-291, 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2022, Virtual, Online, United States, 16/05/22. https://doi.org/10.1145/3507657.3529656","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:publications/3bfb4870-8458-4c6b-8f76-9aa326552daa","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/3bfb4870-8458-4c6b-8f76-9aa326552daa","pdf_url":"https://pure.tue.nl/ws/files/370914657/3507657.3529656.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ibrahim, O A, Sciancalepore, S & Di Pietro, R 2022, MAG-PUF - Authenticating IoT Devices via Magnetic Physical Unclonable Functions. in WiSec '22 : Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc., New York, pp. 290-291, 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2022, Virtual, Online, United States, 16/05/22. https://doi.org/10.1145/3507657.3529656","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G194256065","display_name":null,"funder_award_id":"GSRA6-1-0528-19046","funder_id":"https://openalex.org/F4320332753","funder_display_name":"Qatar National Research Fund"}],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"},{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"},{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4229076093.pdf","grobid_xml":"https://content.openalex.org/works/W4229076093.grobid-xml"},"referenced_works_count":4,"referenced_works":["https://openalex.org/W2797477167","https://openalex.org/W2914764075","https://openalex.org/W3005868211","https://openalex.org/W7075356051"],"related_works":["https://openalex.org/W2984253014","https://openalex.org/W2963331030","https://openalex.org/W2773656420","https://openalex.org/W4309969652","https://openalex.org/W2942005518","https://openalex.org/W2343748889","https://openalex.org/W2948603704","https://openalex.org/W4313886566","https://openalex.org/W4210403433","https://openalex.org/W4288069010"],"abstract_inverted_index":{"Authenticating":[0],"Internet":[1],"of":[2,85,91],"Things":[3],"(IoT)":[4],"devices":[5,60],"is":[6,24],"still":[7],"a":[8,40,47,97],"defiant":[9],"task,":[10],"despite":[11],"the":[12,18,89],"remarkable":[13],"technological":[14],"advancement":[15],"achieved":[16],"in":[17,27],"last":[19],"few":[20],"years.":[21],"The":[22],"issue":[23],"especially":[25],"challenging":[26],"scenarios":[28],"involving":[29,71],"low-cost":[30],"constrained":[31],"nodes,":[32],"hardly":[33],"supporting":[34],"dynamic":[35],"re-keying":[36],"algorithms.":[37],"To":[38],"provide":[39],"viable":[41],"general-purpose":[42],"solution,":[43],"we":[44],"propose":[45],"MAG-PUF:":[46],"novel":[48],"and":[49,75,100],"lightweight":[50],"authentication":[51,83],"scheme":[52],"using":[53,92],"unintentional":[54],"magnetic":[55,94],"emissions":[56,95],"produced":[57],"by":[58],"IoT":[59,104],"to":[61],"implement":[62],"Physical":[63],"Unclonable":[64],"Functions":[65],"(PUFs).":[66],"Our":[67],"extensive":[68],"experimental":[69],"campaign,":[70],"25":[72],"Arduino":[73],"boards":[74],"four":[76],"example":[77],"reference":[78],"functions,":[79],"unveiled":[80],"an":[81],"outstanding":[82],"accuracy":[84],"over":[86],"99%,":[87],"proving":[88],"feasibility":[90],"code-driven":[93],"as":[96],"lightweight,":[98],"efficient,":[99],"robust":[101],"PUF":[102],"for":[103],"deployments.":[105]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
