{"id":"https://openalex.org/W4378800985","doi":"https://doi.org/10.1145/3583781.3590206","title":"PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT","display_name":"PUFchain 4.0: Integrating PUF-based TPM in Distributed Ledger for Security-by-Design of IoT","publication_year":2023,"publication_date":"2023-05-31","ids":{"openalex":"https://openalex.org/W4378800985","doi":"https://doi.org/10.1145/3583781.3590206"},"language":"en","primary_location":{"id":"doi:10.1145/3583781.3590206","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583781.3590206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2023","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036912928","display_name":"Venkata K. V. V. Bathalapalli","orcid":"https://orcid.org/0000-0002-4487-3239"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Venkata K. V. V. Bathalapalli","raw_affiliation_strings":["University of North Texas, Denton, TX, USA"],"raw_orcid":"https://orcid.org/0000-0002-4487-3239","affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070359867","display_name":"Saraju P. Mohanty","orcid":"https://orcid.org/0000-0003-2959-6541"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saraju P. Mohanty","raw_affiliation_strings":["University of North Texas, Denton, TX, USA"],"raw_orcid":"https://orcid.org/0000-0003-2959-6541","affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062843590","display_name":"Elias Kougianos","orcid":"https://orcid.org/0000-0002-1616-7628"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elias Kougianos","raw_affiliation_strings":["University of North Texas, Denton, TX, USA"],"raw_orcid":"https://orcid.org/0000-0002-1616-7628","affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022570209","display_name":"Vasanth Iyer","orcid":"https://orcid.org/0000-0002-1909-4276"},"institutions":[{"id":"https://openalex.org/I152158401","display_name":"Grambling State University","ror":"https://ror.org/05mnb6484","country_code":"US","type":"education","lineage":["https://openalex.org/I152158401","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vasanth Iyer","raw_affiliation_strings":["Grambling State University, Grambling, LA, USA"],"raw_orcid":"https://orcid.org/0000-0002-1909-4276","affiliations":[{"raw_affiliation_string":"Grambling State University, Grambling, LA, USA","institution_ids":["https://openalex.org/I152158401"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087626448","display_name":"Bibhudutta Rout","orcid":"https://orcid.org/0000-0002-7748-1469"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bibhudutta Rout","raw_affiliation_strings":["University of North Texas, Denton, TX, USA"],"raw_orcid":"https://orcid.org/0000-0002-7748-1469","affiliations":[{"raw_affiliation_string":"University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036912928"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":2.9924,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.91176471,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"231","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7305026054382324},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.6813268661499023},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.574796199798584},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.5551869869232178},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5359379053115845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5141990184783936},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5113295912742615},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46079427003860474},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.45074278116226196},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.41802743077278137},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41091394424438477}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7305026054382324},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.6813268661499023},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.574796199798584},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.5551869869232178},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5359379053115845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5141990184783936},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5113295912742615},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46079427003860474},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.45074278116226196},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.41802743077278137},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41091394424438477}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3583781.3590206","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3583781.3590206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Great Lakes Symposium on VLSI 2023","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G8149488665","display_name":null,"funder_award_id":"2101181","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2142065994","https://openalex.org/W2242924528","https://openalex.org/W3003319262","https://openalex.org/W3003449378","https://openalex.org/W3006099874","https://openalex.org/W3007330250","https://openalex.org/W3008363738","https://openalex.org/W3036973644","https://openalex.org/W3083298495","https://openalex.org/W3088582240","https://openalex.org/W3131804642","https://openalex.org/W3212559011","https://openalex.org/W4214670577","https://openalex.org/W4214822864","https://openalex.org/W4283660589","https://openalex.org/W4298147608","https://openalex.org/W4312828347"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2354645290","https://openalex.org/W2168345601","https://openalex.org/W2390768934","https://openalex.org/W2695299078","https://openalex.org/W2372678089","https://openalex.org/W1497930374","https://openalex.org/W2365715481","https://openalex.org/W2374998183","https://openalex.org/W104943326"],"abstract_inverted_index":{"This":[0],"work":[1],"presents":[2],"a":[3,71,180],"sustainable":[4,23,170],"cybersecurity":[5],"solution":[6],"using":[7,132],"Physical":[8],"Unclonable":[9],"Functions":[10],"(PUF),":[11],"Trusted":[12],"Platform":[13],"Module":[14],"(TPM),":[15],"and":[16,25,107,173,188,202],"Tangle":[17,168],"Distributed":[18],"Ledger":[19],"Technology":[20],"(DLT)":[21],"for":[22,47,125,169,186,213],"device":[24],"data":[26,171],"security.":[27],"Security-by-Design":[28],"(SbD)":[29],"or":[30],"Hardware-":[31],"Assisted":[32],"Security":[33],"(HAS)":[34],"solutions":[35],"have":[36],"gained":[37],"much":[38],"prominence":[39],"due":[40],"to":[41,121,130,140,192],"the":[42,66,90,94,98,105,113,127,133,141,151,159,196,206,209],"requirement":[43],"of":[44,80,92,208],"tamper-proof":[45],"storage":[46,174],"hardwareassisted":[48],"cryptography":[49],"solutions.":[50,217],"Designing":[51],"complex":[52],"security":[53,75,172,216],"mechanisms":[54],"can":[55,108],"impact":[56],"their":[57],"efficiency":[58],"as":[59,156],"IoT":[60,123,177],"applications":[61],"are":[62],"more":[63],"decentralized.":[64],"In":[65],"proposed":[67,85,165,197],"architecture,":[68],"we":[69],"presented":[70,210],"novel":[72],"TPM-enabled":[73],"PUF-based":[74],"mechanism":[76,86],"with":[77,82],"effective":[78],"integration":[79],"PUF":[81,95,128],"TPM.":[83],"The":[84,164],"is":[87,119,148],"based":[88],"on":[89],"process":[91],"sealing":[93,126],"key":[96,129],"in":[97,175],"TPM,":[99],"which":[100,204],"cannot":[101],"be":[102,110],"accessed":[103],"outside":[104],"TPM":[106,114,131],"only":[109],"unsealed":[111],"by":[112,150,158],"itself.":[115],"A":[116],"specified":[117,157],"NV-index":[118],"assigned":[120],"each":[122],"node":[124],"Media":[134],"Access":[135,139,145],"Control":[136],"(MAC)":[137],"address.":[138],"TPM's":[142,152],"Non-Volatile":[143],"Random":[144],"Memory":[146],"(NVRAM)":[147],"defined":[149],"Enhanced":[153],"Authorization":[154],"policies":[155],"Trust":[160],"Computing":[161],"Group":[162],"(TCG).":[163],"architecture":[166],"uses":[167],"decentralized":[176,214],"systems":[178],"through":[179,199],"Masked":[181],"Authentication":[182],"Messaging":[183],"(MAM)":[184],"scheme":[185],"efficient":[187],"secure":[189],"access":[190],"control":[191],"Tangle.":[193],"We":[194],"validated":[195],"approach":[198],"experimental":[200],"analysis":[201],"implementation,":[203],"substantiates":[205],"potential":[207],"PUFchain":[211],"4.0":[212],"IoT-driven":[215]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
