{"id":"https://openalex.org/W4411494723","doi":"https://doi.org/10.3390/fi17070272","title":"Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing","display_name":"Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing","publication_year":2025,"publication_date":"2025-06-20","ids":{"openalex":"https://openalex.org/W4411494723","doi":"https://doi.org/10.3390/fi17070272"},"language":"en","primary_location":{"id":"doi:10.3390/fi17070272","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17070272","pdf_url":"https://www.mdpi.com/1999-5903/17/7/272/pdf?version=1750416524","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/17/7/272/pdf?version=1750416524","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027629934","display_name":"Seema G. Aarella","orcid":"https://orcid.org/0009-0006-8807-3352"},"institutions":[{"id":"https://openalex.org/I12138139","display_name":"Austin College","ror":"https://ror.org/052k56z27","country_code":"US","type":"education","lineage":["https://openalex.org/I12138139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Seema G. Aarella","raw_affiliation_strings":["Department of Computer Science, Austin College, Sherman, TX 75090, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Austin College, Sherman, TX 75090, USA","institution_ids":["https://openalex.org/I12138139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040058017","display_name":"Venkata P. Yanambaka","orcid":"https://orcid.org/0000-0003-4625-8050"},"institutions":[{"id":"https://openalex.org/I150913223","display_name":"Texas Woman's University","ror":"https://ror.org/04dyzkj40","country_code":"US","type":"education","lineage":["https://openalex.org/I150913223"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Venkata P. Yanambaka","raw_affiliation_strings":["School of Sciences, Texas Woman\u2019s University, Denton, TX 76204, USA","School of Sciences, Texas Woman's University, Denton, TX 76204, USA"],"affiliations":[{"raw_affiliation_string":"School of Sciences, Texas Woman\u2019s University, Denton, TX 76204, USA","institution_ids":["https://openalex.org/I150913223"]},{"raw_affiliation_string":"School of Sciences, Texas Woman's University, Denton, TX 76204, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070359867","display_name":"Saraju P. Mohanty","orcid":"https://orcid.org/0000-0003-2959-6541"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saraju P. Mohanty","raw_affiliation_strings":["Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062843590","display_name":"Elias Kougianos","orcid":"https://orcid.org/0000-0002-1616-7628"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elias Kougianos","raw_affiliation_strings":["Department of Electrical Engineering, University of North Texas, Denton, TX 76203, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of North Texas, Denton, TX 76203, USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027629934"],"corresponding_institution_ids":["https://openalex.org/I12138139"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.3442,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86283791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"17","issue":"7","first_page":"272","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11601","display_name":"Neuroscience and Neural Engineering","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/2804","display_name":"Cellular and Molecular Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8921427726745605},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.5746971368789673},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5604525804519653},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5358895659446716},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5199224352836609},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5093944668769836},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4597272276878357},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4471292793750763},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.43770286440849304},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.4339098036289215},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.421707421541214},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41517600417137146},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40376338362693787},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37654298543930054},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3068851828575134},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29640161991119385},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18555700778961182},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15331286191940308}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8921427726745605},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.5746971368789673},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5604525804519653},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5358895659446716},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5199224352836609},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5093944668769836},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4597272276878357},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4471292793750763},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.43770286440849304},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.4339098036289215},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.421707421541214},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41517600417137146},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40376338362693787},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37654298543930054},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3068851828575134},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29640161991119385},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18555700778961182},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15331286191940308}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/fi17070272","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17070272","pdf_url":"https://www.mdpi.com/1999-5903/17/7/272/pdf?version=1750416524","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:32680247f01f4f71a39ecf7883e71f97","is_oa":true,"landing_page_url":"https://doaj.org/article/32680247f01f4f71a39ecf7883e71f97","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 17, Iss 7, p 272 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/fi17070272","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi17070272","pdf_url":"https://www.mdpi.com/1999-5903/17/7/272/pdf?version=1750416524","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411494723.pdf","grobid_xml":"https://content.openalex.org/works/W4411494723.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W2518327368","https://openalex.org/W2566966930","https://openalex.org/W2568772110","https://openalex.org/W2601424114","https://openalex.org/W2767874523","https://openalex.org/W2899090976","https://openalex.org/W2900606647","https://openalex.org/W2942456745","https://openalex.org/W2943110796","https://openalex.org/W3011082615","https://openalex.org/W3094312506","https://openalex.org/W3113535026","https://openalex.org/W3159305159","https://openalex.org/W3217516741","https://openalex.org/W4220831070","https://openalex.org/W4224277432","https://openalex.org/W4235710683","https://openalex.org/W4283695739","https://openalex.org/W4283800079","https://openalex.org/W4285797004","https://openalex.org/W4292972809","https://openalex.org/W4295974675","https://openalex.org/W4313886566","https://openalex.org/W4317509872","https://openalex.org/W4318969782","https://openalex.org/W4323830151","https://openalex.org/W4365420849","https://openalex.org/W4378800903","https://openalex.org/W4383904418","https://openalex.org/W4386492830","https://openalex.org/W4386552944","https://openalex.org/W4388430345","https://openalex.org/W4390549888","https://openalex.org/W4391216978","https://openalex.org/W4391384948","https://openalex.org/W4391707539","https://openalex.org/W4392029839","https://openalex.org/W4392785972","https://openalex.org/W4398177119","https://openalex.org/W4399343501","https://openalex.org/W4399486740","https://openalex.org/W4399668135","https://openalex.org/W4402164252","https://openalex.org/W4402628835","https://openalex.org/W4403759327","https://openalex.org/W4403808965","https://openalex.org/W4403962893","https://openalex.org/W4404528946","https://openalex.org/W4404564234","https://openalex.org/W4404955754","https://openalex.org/W4406509823","https://openalex.org/W4407052789","https://openalex.org/W4407366161","https://openalex.org/W4407776995","https://openalex.org/W4408121980","https://openalex.org/W4409700807","https://openalex.org/W6787844933","https://openalex.org/W6839296338"],"related_works":["https://openalex.org/W4386278306","https://openalex.org/W2010558539","https://openalex.org/W2580259249","https://openalex.org/W3096667951","https://openalex.org/W4288068867","https://openalex.org/W102880045","https://openalex.org/W2594513438","https://openalex.org/W2923499815","https://openalex.org/W3174401943","https://openalex.org/W4377000511"],"abstract_inverted_index":{"This":[0,84],"research":[1,133],"introduces":[2],"Fortified-Edge":[3,42],"2.0,":[4],"a":[5,45,135],"novel":[6],"authentication":[7,78,143],"framework":[8],"that":[9,30],"addresses":[10],"critical":[11],"security":[12],"and":[13,37,51,97,111,119,138],"privacy":[14],"challenges":[15],"in":[16,144],"Physically":[17],"Unclonable":[18],"Function":[19],"(PUF)-based":[20],"systems":[21],"for":[22,141],"collaborative":[23],"edge":[24,145],"computing":[25],"(CEC).":[26],"Unlike":[27],"conventional":[28],"methods":[29],"transmit":[31,89],"full":[32],"binary":[33,61,91],"Challenge\u2013Response":[34],"Pairs":[35],"(CRPs)":[36],"risk":[38],"exposing":[39,80],"sensitive":[40,90],"data,":[41,92],"2.0":[43],"employs":[44],"machine-learning-driven":[46],"feature-abstraction":[47],"technique":[48],"to":[49,75,88],"extract":[50],"utilize":[52],"only":[53],"essential":[54],"characteristics":[55],"of":[56,123],"CRPs,":[57],"obfuscating":[58],"the":[59,81,86,94,116],"raw":[60],"sequences.":[62],"These":[63],"feature":[64],"vectors":[65],"are":[66],"then":[67],"processed":[68],"using":[69],"lightweight":[70],"cryptographic":[71],"primitives,":[72],"including":[73],"ECDSA,":[74],"enable":[76],"secure":[77],"without":[79],"original":[82],"CRP.":[83],"eliminates":[85],"need":[87],"reducing":[93],"attack":[95],"surface":[96],"bandwidth":[98],"usage.":[99],"The":[100],"proposed":[101],"method":[102],"demonstrates":[103],"strong":[104],"resilience":[105],"against":[106],"modeling":[107],"attacks,":[108,110],"replay":[109],"side-channel":[112],"threats":[113],"while":[114],"maintaining":[115],"inherent":[117],"efficiency":[118],"low":[120],"power":[121],"requirements":[122],"PUFs.":[124],"By":[125],"integrating":[126],"PUF":[127],"unpredictability":[128],"with":[129],"ML":[130],"adaptability,":[131],"this":[132],"delivers":[134],"scalable,":[136],"secure,":[137],"resource-efficient":[139],"solution":[140],"next-generation":[142],"environments.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
