{"id":"https://openalex.org/W7133125253","doi":"https://doi.org/10.1186/s42400-025-00498-8","title":"Secure and scalable access protocol for enhancing IEEE 1687 network security","display_name":"Secure and scalable access protocol for enhancing IEEE 1687 network security","publication_year":2026,"publication_date":"2026-03-02","ids":{"openalex":"https://openalex.org/W7133125253","doi":"https://doi.org/10.1186/s42400-025-00498-8"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00498-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00498-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00498-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00498-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127750748","display_name":"Gaurav Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gaurav Kumar","raw_affiliation_strings":["Electrical Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064248086","display_name":"Mahendra Kumar Gurve","orcid":"https://orcid.org/0009-0000-5247-6535"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mahendra Kumar Gurve","raw_affiliation_strings":["Computer Science and Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127763410","display_name":"Nitin","orcid":null},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nitin","raw_affiliation_strings":["Electrical and Computer Engineering, University of Cincinnati, Cincinnati, 210091, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Cincinnati, Cincinnati, 210091, USA","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103716283","display_name":"Yamuna Prasad","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Yamuna Prasad","raw_affiliation_strings":["Computer Science and Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078604240","display_name":"Satyadev Ahlawat","orcid":"https://orcid.org/0000-0003-0186-1446"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Satyadev Ahlawat","raw_affiliation_strings":["Electrical Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering, Indian Institute of Technology Jammu, Jammu, Jammu and Kashmir, 301019, India","institution_ids":["https://openalex.org/I4210127441"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5127750748"],"corresponding_institution_ids":["https://openalex.org/I4210127441"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.48182493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.7595999836921692,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.7595999836921692,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.17820000648498535,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.017500000074505806,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.579800009727478},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5683000087738037},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49639999866485596},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4239000082015991},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4180000126361847},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4066999852657318},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.37229999899864197},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.3686999976634979},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3677000105381012}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770799994468689},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.579800009727478},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5683000087738037},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5192000269889832},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49639999866485596},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4239000082015991},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4180000126361847},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4066999852657318},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.37229999899864197},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.3686999976634979},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3677000105381012},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3537999987602234},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3476000130176544},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.33239999413490295},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.32359999418258667},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.32019999623298645},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2962000072002411},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.267300009727478},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.25870001316070557}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00498-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00498-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00498-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:44495494766340b195d3b9d688dba7d4","is_oa":true,"landing_page_url":"https://doaj.org/article/44495494766340b195d3b9d688dba7d4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00498-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00498-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00498-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7133125253.pdf","grobid_xml":"https://content.openalex.org/works/W7133125253.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1492283300","https://openalex.org/W1997823608","https://openalex.org/W2004467081","https://openalex.org/W2055678210","https://openalex.org/W2078353671","https://openalex.org/W2141624968","https://openalex.org/W2142537526","https://openalex.org/W2296136960","https://openalex.org/W2570543678","https://openalex.org/W2580787407","https://openalex.org/W2734491096","https://openalex.org/W2781852892","https://openalex.org/W2787358728","https://openalex.org/W2806509278","https://openalex.org/W2958641008","https://openalex.org/W2981432138","https://openalex.org/W3080770657","https://openalex.org/W3119853173","https://openalex.org/W3177061203","https://openalex.org/W3204630445","https://openalex.org/W4206508980","https://openalex.org/W4230721748","https://openalex.org/W4231486519","https://openalex.org/W4235430437","https://openalex.org/W4243047118","https://openalex.org/W4281755357","https://openalex.org/W4283762580","https://openalex.org/W4297337414","https://openalex.org/W4308575528","https://openalex.org/W4312036138","https://openalex.org/W4377231681","https://openalex.org/W4380551725","https://openalex.org/W4384787464","https://openalex.org/W4402215790"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Modern":[1],"System-on-Chip":[2],"(SoC)":[3],"designs":[4],"integrate":[5],"various":[6],"embedded":[7],"instruments":[8],"and":[9,20,35,63,72,105,140,192,250,277,297,329,334,348],"proprietary":[10],"data":[11],"to":[12,32,38,54,142,214,231,289,306],"support":[13],"critical":[14],"operations":[15],"such":[16],"as":[17],"testing,":[18],"diagnosis,":[19],"in-field":[21],"health":[22],"monitoring.":[23],"The":[24,196],"IEEE":[25],"Std.":[26],"1687":[27],"(IJTAG)":[28],"is":[29,114,173],"widely":[30],"adopted":[31],"provide":[33],"efficient":[34],"flexible":[36],"access":[37,85,96,156],"these":[39],"on-chip":[40],"instruments.":[41],"However,":[42,128],"its":[43],"reconfigurable":[44],"nature":[45],"exposes":[46],"a":[47,83,98,103,107,111,132,151,274,278,294,298],"significant":[48],"attack":[49,210],"surface,":[50],"making":[51],"it":[52,301],"vulnerable":[53],"advanced":[55],"security":[56,78],"threats,":[57],"including":[58],"machine":[59,208],"learning,":[60],"differential":[61,220],"analysis,":[62],"power":[64,252],"analysis":[65,221,253],"attacks,":[66],"which":[67],"can":[68],"extract":[69],"Chip":[70],"IDs":[71],"cryptographic":[73],"keys.":[74],"To":[75,145],"enhance":[76],"the":[77,80,91,117,129,137,170,178,183,189,204,217,224,259,264,281,332,342],"of":[79,182,219,326],"IJTAG":[81,317],"architecture,":[82],"secure":[84,95,155],"protocol":[86,157,206,344],"has":[87],"been":[88],"proposed":[89,205,260,343],"in":[90],"literature.":[92],"In":[93,257],"this":[94,119,147],"scheme,":[97],"random":[99],"number":[100],"generator":[101],"produces":[102],"bitstream,":[104,184],"whenever":[106],"predefined":[108],"template":[109,135,153,172,276,296],"matches,":[110],"key":[112,124,143,165,225,269],"bit":[113,181],"inserted":[115],"into":[116,188],"bitstream;":[118],"process":[120,191],"continues":[121],"until":[122],"all":[123],"bits":[125],"are":[126,162],"embedded.":[127],"reliance":[130],"on":[131,177,315],"single":[133],"static":[134],"renders":[136,251],"scheme":[138,261],"predictable":[139],"susceptible":[141],"recovery.":[144],"overcome":[146],"limitation,":[148],"we":[149],"propose":[150],"multi-dynamic":[152],"based":[154,176],",":[158],"where":[159],"multiple":[160],"templates":[161],"employed":[163],"for":[164,268,293,331,351],"insertion.":[166,270],"For":[167,271],"each":[168],"comparison,":[169],"specific":[171],"dynamically":[174],"selected":[175],"last":[179],"generated":[180],"thereby":[185],"introducing":[186],"randomness":[187],"embedding":[190],"obfuscating":[193],"adversarial":[194],"analysis.":[195],"experimental":[197],"evaluation":[198],"demonstrates":[199],"that,":[200],"with":[201,273,323],"eight":[202],"templates,":[203],"reduces":[207,263],"learning":[209],"accuracy":[211],"from":[212,228,286,303],"98.31":[213],"0.0002%,":[215],"increases":[216],"complexity":[218],"by":[222],"extending":[223],"retrieval":[226],"time":[227],"3":[229],"ms":[230],"approximately":[232],"$$":[233,237],"1.67":[234],"\\times":[235],"10^{10}":[236],"<mml:math":[238],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[239],"<mml:mrow>":[240],"<mml:mn>1.67</mml:mn>":[241],"<mml:mo>\u00d7</mml:mo>":[242],"<mml:msup>":[243],"<mml:mn>10</mml:mn>":[244,245],"</mml:msup>":[246],"</mml:mrow>":[247],"</mml:math>":[248],"years,":[249],"attacks":[254],"completely":[255],"infeasible.":[256],"addition,":[258],"significantly":[262],"bitstream":[265,283],"length":[266,284],"required":[267,282],"instance,":[272],"16-bit":[275],"256-bit":[279,299],"key,":[280,300],"decreases":[285,302],"16.6":[287],"million":[288],"12.8":[290],"thousand,":[291,308],"while":[292,309],"24-bit":[295],"4.2":[304],"billion":[305],"57.2":[307],"maintaining":[310],"security.":[311],"Furthermore,":[312],"hardware":[313],"synthesis":[314],"ITC\u201916":[316],"benchmarks":[318],"confirms":[319],"negligible":[320],"implementation":[321],"cost,":[322],"area":[324],"overheads":[325],"only":[327],"1.65%":[328],"1.53%":[330],"TreeFlatEx":[333],"TreeBalanced":[335],"benchmarks,":[336],"respectively.":[337],"These":[338],"results":[339],"demonstrate":[340],"that":[341],"provides":[345],"scalable,":[346],"resource-efficient":[347],"robust":[349],"protection":[350],"IJTAG-enabled":[352],"SoCs":[353],"against":[354],"state-of-the-art":[355],"attacks.":[356]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2026-03-02T00:00:00"}
