{"id":"https://openalex.org/W7113897058","doi":"https://doi.org/10.1145/3748699.3749808","title":"Secure Hardware-Assisted Blockchain Framework for IoT Device Authentication using Zero-Knowledge Proofs","display_name":"Secure Hardware-Assisted Blockchain Framework for IoT Device Authentication using Zero-Knowledge Proofs","publication_year":2025,"publication_date":"2025-09-03","ids":{"openalex":"https://openalex.org/W7113897058","doi":"https://doi.org/10.1145/3748699.3749808"},"language":null,"primary_location":{"id":"doi:10.1145/3748699.3749808","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3748699.3749808","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 International Conference on Information Technology for Social Good","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kesara Wimal","orcid":"https://orcid.org/0000-0002-9729-9437"},"institutions":[{"id":"https://openalex.org/I18452974","display_name":"Letterkenny Institute of Technology","ror":"https://ror.org/04ps1tq95","country_code":"IE","type":"education","lineage":["https://openalex.org/I18452974"]},{"id":"https://openalex.org/I4387152698","display_name":"Atlantic Technological University","ror":"https://ror.org/0458dap48","country_code":null,"type":"education","lineage":["https://openalex.org/I4387152698"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Kesara Wimal","raw_affiliation_strings":["Department of Computing, Atlantic Technological University, Letterkenny, Co. Donegal, Ireland"],"raw_orcid":"https://orcid.org/0000-0002-9729-9437","affiliations":[{"raw_affiliation_string":"Department of Computing, Atlantic Technological University, Letterkenny, Co. Donegal, Ireland","institution_ids":["https://openalex.org/I18452974","https://openalex.org/I4387152698"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Gary Cullen","orcid":"https://orcid.org/0000-0001-9009-6138"},"institutions":[{"id":"https://openalex.org/I18452974","display_name":"Letterkenny Institute of Technology","ror":"https://ror.org/04ps1tq95","country_code":"IE","type":"education","lineage":["https://openalex.org/I18452974"]},{"id":"https://openalex.org/I4387152698","display_name":"Atlantic Technological University","ror":"https://ror.org/0458dap48","country_code":null,"type":"education","lineage":["https://openalex.org/I4387152698"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Gary Cullen","raw_affiliation_strings":["Department of Computing, Atlantic Technological University, Letterkenny, Co. Donegal, Ireland"],"raw_orcid":"https://orcid.org/0000-0001-9009-6138","affiliations":[{"raw_affiliation_string":"Department of Computing, Atlantic Technological University, Letterkenny, Co. Donegal, Ireland","institution_ids":["https://openalex.org/I18452974","https://openalex.org/I4387152698"]}]},{"author_position":"last","author":{"id":null,"display_name":"John Donovan","orcid":"https://orcid.org/0000-0003-3531-1928"},"institutions":[{"id":"https://openalex.org/I2799680125","display_name":"Sligo University Hospital","ror":"https://ror.org/03ke5zk82","country_code":"IE","type":"healthcare","lineage":["https://openalex.org/I2799680125","https://openalex.org/I2800263200","https://openalex.org/I37076085","https://openalex.org/I4210128306","https://openalex.org/I4210136517"]},{"id":"https://openalex.org/I82288201","display_name":"Institute of Technology Sligo","ror":"https://ror.org/032fvf508","country_code":"IE","type":"education","lineage":["https://openalex.org/I82288201"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"John Donovan","raw_affiliation_strings":["Faculty of Engineering and Design, Atlantic Technological University, Sligo, Co. Sligo, Ireland"],"raw_orcid":"https://orcid.org/0000-0003-3531-1928","affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Design, Atlantic Technological University, Sligo, Co. Sligo, Ireland","institution_ids":["https://openalex.org/I82288201","https://openalex.org/I2799680125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I18452974","https://openalex.org/I4387152698"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.6296144,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"321","last_page":"325"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.002300000051036477,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6152999997138977},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.558899998664856},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47200000286102295},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.42649999260902405},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4165000021457672},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.3862999975681305},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37389999628067017},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.3734000027179718},{"id":"https://openalex.org/keywords/tamper-resistance","display_name":"Tamper resistance","score":0.36959999799728394}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6899999976158142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6797999739646912},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6152999997138977},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.558899998664856},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47200000286102295},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.42649999260902405},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4165000021457672},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.3862999975681305},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3734000027179718},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.36959999799728394},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.34860000014305115},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.3409000039100647},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.3345000147819519},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.33149999380111694},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.32109999656677246},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.30889999866485596},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.30820000171661377},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.28769999742507935},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.28349998593330383},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.27720001339912415},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2768000066280365},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.275299996137619},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.25529998540878296},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3748699.3749808","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3748699.3749808","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 International Conference on Information Technology for Social Good","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W179272234","https://openalex.org/W1970606468","https://openalex.org/W2003544295","https://openalex.org/W2043007983","https://openalex.org/W2095410905","https://openalex.org/W2104927807","https://openalex.org/W2116374153","https://openalex.org/W2392113277","https://openalex.org/W2588585573","https://openalex.org/W2604813584","https://openalex.org/W2606467208","https://openalex.org/W2611626082","https://openalex.org/W2768152971","https://openalex.org/W2888413717","https://openalex.org/W3194918904","https://openalex.org/W4401880168","https://openalex.org/W4402533111","https://openalex.org/W4409342221"],"related_works":[],"abstract_inverted_index":{"The":[0,136],"rapid":[1],"expansion":[2],"of":[3,5,42],"Internet":[4],"Things":[6],"(IoT)":[7],"deployments":[8],"across":[9],"smart":[10],"environments":[11],"introduces":[12],"critical":[13],"security":[14,57,168],"challenges,":[15],"particularly":[16],"at":[17],"the":[18,39,160,171],"device":[19,92],"identity":[20,93,147],"and":[21,27,45,68,90,122,129,146,166,176],"physical":[22,143],"layers.":[23],"Traditional":[24],"cryptographic":[25],"methods":[26],"Distributed":[28],"Ledger":[29],"Technologies":[30],"(DLTs),":[31],"while":[32,149],"valuable,":[33],"often":[34],"fail":[35],"to":[36,48,72,106,141],"account":[37],"for":[38,153,162],"constrained":[40],"resources":[41],"IoT":[43,78,155,181],"devices":[44,105],"their":[46],"susceptibility":[47],"physical-layer":[49],"attacks.":[50],"This":[51,157],"paper":[52],"proposes":[53],"a":[54,69,119,163],"scalable,":[55],"lightweight":[56],"framework":[58],"that":[59],"integrates":[60],"Physical":[61],"Unclonable":[62],"Functions":[63],"(PUFs),":[64],"Zero-Knowledge":[65],"Proofs":[66],"(ZKPs),":[67],"permissioned":[70,115],"blockchain":[71,116],"establish":[73],"end-to-end":[74],"trust":[75,84,178],"in":[76,179],"distributed":[77],"ecosystems.":[79],"PUFs":[80],"act":[81],"as":[82,118],"hardware-rooted":[83],"anchors,":[85],"enabling":[86],"secure":[87],"key":[88],"generation":[89],"unclonable":[91],"without":[94,109],"relying":[95],"on":[96],"non-volatile":[97],"memory.":[98],"ZKPs":[99],"facilitate":[100],"mutual":[101],"authentication":[102,127],"by":[103],"allowing":[104],"prove":[107],"legitimacy":[108],"revealing":[110],"any":[111],"identifying":[112],"information.":[113],"A":[114],"acts":[117],"decentralised":[120,167],"verification":[121],"audit":[123],"layer,":[124],"immutably":[125],"recording":[126],"events":[128],"ensuring":[130],"tamper":[131],"resistance":[132],"with":[133],"controlled":[134],"governance.":[135],"proposed":[137],"architecture":[138],"is":[139],"designed":[140],"counteract":[142],"tampering,":[144],"spoofing,":[145],"forgery":[148],"remaining":[150],"computationally":[151],"viable":[152],"resource-constrained":[154],"devices.":[156],"work":[158],"presents":[159],"foundation":[161],"robust,":[164],"privacy-preserving,":[165],"model,":[169],"bridging":[170],"gap":[172],"between":[173],"hardware-level":[174],"assurance":[175],"scalable":[177],"future":[180],"deployments.":[182]},"counts_by_year":[],"updated_date":"2025-12-11T00:24:52.286860","created_date":"2025-12-11T00:00:00"}
