{"id":"https://openalex.org/W3212338052","doi":"https://doi.org/10.3390/cryptography5040032","title":"Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies","display_name":"Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies","publication_year":2021,"publication_date":"2021-11-09","ids":{"openalex":"https://openalex.org/W3212338052","doi":"https://doi.org/10.3390/cryptography5040032","mag":"3212338052"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography5040032","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography5040032","pdf_url":"https://www.mdpi.com/2410-387X/5/4/32/pdf?version=1636529747","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/5/4/32/pdf?version=1636529747","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008606281","display_name":"Emad Hamadaqa","orcid":null},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Emad Hamadaqa","raw_affiliation_strings":["Institute of Computer and Network Engineering, Technical University of Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Computer and Network Engineering, Technical University of Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024325751","display_name":"Saleh Mulhem","orcid":"https://orcid.org/0000-0001-7380-5270"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Saleh Mulhem","raw_affiliation_strings":["Institute of Computer Engineering, Geb\u00e4ude 64, University of L\u00fcbeck, Ratzeburger Allee 160, D-23562 L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, Geb\u00e4ude 64, University of L\u00fcbeck, Ratzeburger Allee 160, D-23562 L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112355190","display_name":"Wael Adi","orcid":null},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Wael Adi","raw_affiliation_strings":["Institute of Computer and Network Engineering, Technical University of Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Computer and Network Engineering, Technical University of Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039777488","display_name":"Mladen Berekovi\u0107","orcid":"https://orcid.org/0000-0003-1911-756X"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mladen Berekovic","raw_affiliation_strings":["Institute of Computer Engineering, Geb\u00e4ude 64, University of L\u00fcbeck, Ratzeburger Allee 160, D-23562 L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Engineering, Geb\u00e4ude 64, University of L\u00fcbeck, Ratzeburger Allee 160, D-23562 L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5008606281"],"corresponding_institution_ids":["https://openalex.org/I94509681"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17466078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"4","first_page":"32","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/clone","display_name":"clone (Java method)","score":0.6711928248405457},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6487997770309448},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6035352945327759},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6033901572227478},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5825353264808655},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5815938711166382},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4986538887023926},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.48820143938064575},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4457992911338806},{"id":"https://openalex.org/keywords/cloning","display_name":"Cloning (programming)","score":0.426763653755188},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4178204834461212}],"concepts":[{"id":"https://openalex.org/C81089528","wikidata":"https://www.wikidata.org/wiki/Q5134986","display_name":"clone (Java method)","level":3,"score":0.6711928248405457},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6487997770309448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6035352945327759},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6033901572227478},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5825353264808655},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5815938711166382},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4986538887023926},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.48820143938064575},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4457992911338806},{"id":"https://openalex.org/C121050878","wikidata":"https://www.wikidata.org/wiki/Q5135020","display_name":"Cloning (programming)","level":2,"score":0.426763653755188},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4178204834461212},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography5040032","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography5040032","pdf_url":"https://www.mdpi.com/2410-387X/5/4/32/pdf?version=1636529747","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a6289d363639480cb0a8000811ab2775","is_oa":true,"landing_page_url":"https://doaj.org/article/a6289d363639480cb0a8000811ab2775","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 5, Iss 4, p 32 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography5040032","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography5040032","pdf_url":"https://www.mdpi.com/2410-387X/5/4/32/pdf?version=1636529747","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3212338052.pdf","grobid_xml":"https://content.openalex.org/works/W3212338052.grobid-xml"},"referenced_works_count":69,"referenced_works":["https://openalex.org/W25365497","https://openalex.org/W104720657","https://openalex.org/W124944822","https://openalex.org/W171639838","https://openalex.org/W1532483809","https://openalex.org/W1569083856","https://openalex.org/W1917333369","https://openalex.org/W1965769011","https://openalex.org/W1966117405","https://openalex.org/W1993704367","https://openalex.org/W2010895668","https://openalex.org/W2052908934","https://openalex.org/W2054874293","https://openalex.org/W2070389413","https://openalex.org/W2080284304","https://openalex.org/W2095526927","https://openalex.org/W2099137371","https://openalex.org/W2103827627","https://openalex.org/W2115255494","https://openalex.org/W2126279347","https://openalex.org/W2130351941","https://openalex.org/W2151759197","https://openalex.org/W2152924492","https://openalex.org/W2171246433","https://openalex.org/W2174648984","https://openalex.org/W2178671653","https://openalex.org/W2341260337","https://openalex.org/W2399798860","https://openalex.org/W2430431245","https://openalex.org/W2483049553","https://openalex.org/W2517234635","https://openalex.org/W2548694826","https://openalex.org/W2570008916","https://openalex.org/W2577417592","https://openalex.org/W2580259249","https://openalex.org/W2598729596","https://openalex.org/W2741444940","https://openalex.org/W2747534894","https://openalex.org/W2766697831","https://openalex.org/W2791810490","https://openalex.org/W2884110449","https://openalex.org/W2887621255","https://openalex.org/W2891953071","https://openalex.org/W2896464577","https://openalex.org/W2899762291","https://openalex.org/W2901757354","https://openalex.org/W2901766229","https://openalex.org/W2912467467","https://openalex.org/W2941049640","https://openalex.org/W2943373652","https://openalex.org/W2958057214","https://openalex.org/W2963331030","https://openalex.org/W2964180543","https://openalex.org/W2969632010","https://openalex.org/W2996207699","https://openalex.org/W3082249069","https://openalex.org/W3091699101","https://openalex.org/W3094433534","https://openalex.org/W3126275533","https://openalex.org/W3151293064","https://openalex.org/W3175420845","https://openalex.org/W4235515513","https://openalex.org/W4251343952","https://openalex.org/W4254974527","https://openalex.org/W6634010886","https://openalex.org/W6640063189","https://openalex.org/W6671828919","https://openalex.org/W6679357471","https://openalex.org/W6732605566"],"related_works":["https://openalex.org/W2377327490","https://openalex.org/W2560253012","https://openalex.org/W1524590520","https://openalex.org/W2412288087","https://openalex.org/W2371792548","https://openalex.org/W1987653914","https://openalex.org/W2325518922","https://openalex.org/W2410849822","https://openalex.org/W2126967698","https://openalex.org/W1759004662"],"abstract_inverted_index":{"Internet":[0],"of":[1,95,269],"things":[2,19],"(IoT)":[3],"technologies":[4,87],"have":[5],"recently":[6],"gained":[7],"much":[8],"interest":[9],"from":[10],"numerous":[11],"industries,":[12],"where":[13],"devices,":[14],"machines,":[15],"sensors,":[16],"or":[17,153,171,208],"simply":[18],"are":[20,103,147,220,283,331,337],"linked":[21],"with":[22],"each":[23],"other":[24],"over":[25],"open":[26],"communication":[27],"networks.":[28],"However,":[29,144,289],"such":[30,45,55,145,202],"an":[31,56,59],"operation":[32],"environment":[33,57],"brings":[34],"new":[35],"security":[36,61,324,351],"threats":[37,321],"and":[38,43,83,111,120,195,212,223,227,260,322,340,345,353],"technology":[39,309],"challenges":[40],"in":[41,48,54,133,311,315,326],"securing":[42],"stabilizing":[44],"large":[46],"systems":[47],"the":[49,113,134,151,161,183,231,267,300,327,334],"IoT":[50,91,101,135,313,329,350],"world.":[51],"Device":[52],"identity":[53],"is":[58,108,188,303],"essential":[60],"requirement":[62],"as":[63,137,150,203,243,249,280,290,305],"a":[64,276,306],"secure":[65],"anchor":[66],"for":[67,88,262],"most":[68],"applications":[69,330],"towards":[70],"clone-resistant":[71,90,297,308],"resilient":[72,186],"operational":[73],"security.":[74],"This":[75],"paper":[76],"analyzes":[77],"different":[78],"contemporary":[79],"authenticated":[80],"identification":[81,96,115],"techniques":[82,97,125,146,219,273,336],"discusses":[84],"possible":[85],"future":[86,348],"physically":[89],"units.":[92],"Two":[93],"categories":[94],"to":[98,140,169,174,177,197,225,247,256],"counteract":[99],"cloning":[100],"units":[102,142,314],"discussed.":[104],"The":[105,319],"first":[106],"category":[107,187],"inherently":[109,148,189],"cloneable":[110,149],"includes":[112],"classical":[114,138],"mechanisms":[116],"based":[117],"on":[118],"secret":[119,128,163,214],"public":[121],"key":[122,164],"cryptography.":[123],"Such":[124],"deploy":[126],"mainly":[127],"keys":[129,173],"stored":[130],"permanently":[131],"somewhere":[132],"devices":[136],"means":[139],"make":[141],"clone-resistant.":[143],"manufacturer":[152,232],"device":[154],"personalizers":[155],"can":[156],"clone":[157,228],"them":[158],"by":[159,230],"re-using":[160],"same":[162],"(which":[165],"must":[166],"be":[167],"known":[168],"somebody)":[170],"reveal":[172],"third":[175],"parties":[176],"create":[178],"cloned":[179],"entities.":[180],"In":[181],"contrast,":[182],"second,":[184],"more":[185],"unclonable":[190,205,252],"because":[191],"it":[192],"deploys":[193],"unknown":[194,215],"hard":[196,224],"predict":[198,226],"born":[199],"analog":[200,244,270],"modules":[201,211],"physical":[204],"functions":[206,245],"(PUFs)":[207],"mutated":[209,281],"digital":[210,287,292],"so-called":[213],"ciphers":[216],"(SUCs).":[217],"Both":[218],"DNA-like":[221],"identities":[222,254],"even":[229],"itself.":[233],"Born":[234],"PUFs":[235,242],"were":[236,274],"introduced":[237,275],"two":[238],"decades":[239],"ago;":[240],"however,":[241],"failed":[246],"serve":[248],"practically":[250],"usable":[251],"electronic":[253],"due":[255],"being":[257,286],"costly,":[258],"unstable/inconsistent,":[259],"non-practical":[261],"mass":[263],"application.":[264],"To":[265],"overcome":[266],"drawbacks":[268],"PUFs,":[271],"SUCs":[272],"decade":[277],"ago.":[278],"SUCs,":[279],"modules,":[282,293],"highly":[284],"consistent,":[285],"modules.":[288],"self-mutated":[291],"they":[294],"offer":[295],"only":[296],"identities.":[298],"Therefore,":[299],"SUC":[301],"technique":[302],"proposed":[304],"promising":[307],"embedded":[310],"emerging":[312,328],"non-volatile":[316],"self-reconfiguring":[317],"devices.":[318],"main":[320],"expected":[323,349],"requirements":[325],"postulated.":[332],"Finally,":[333],"presented":[335],"analyzed,":[338],"classified,":[339],"compared":[341],"considering":[342],"security,":[343],"performance,":[344],"complexity":[346],"given":[347],"features":[352],"requirements.":[354]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
