Engineering SRAM-PUF on Arduino microcontroller
The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even spanning thousands of miles. Ensuring authentication, communication integrity, and confidentiality for IoT devices is essential for systems securit...
Uložené v:
| Vydané v: | Journal of systems architecture Ročník 167; s. 103466 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier B.V
01.10.2025
|
| Predmet: | |
| ISSN: | 1383-7621 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even spanning thousands of miles. Ensuring authentication, communication integrity, and confidentiality for IoT devices is essential for systems security and still an open challenge too. In this context, Physical Unclonable Functions (PUFs) have gained significant attention due to their ability to generate stable, tamper-resistant, and random fingerprints that can be successfully exploited to provide cryptography keys or to implement authentication schemes. However, PUFs necessitate dedicated hardware, making them costly and available only in specific designs, thereby impeding their broader adoption. In this paper, we enable the usage of static random access memory (SRAM)-based PUF on Arduino UNO device, an open-source board implemented upon an ATMega328P, without requiring special hardware. We analyze SRAM PUF quality parameters and how to reconstruct a reliable cryptography key by engineering a fuzzy extractor. Additionally, we design a secure bootloader as root-of-trust and, as a case study, we detail how to authenticate Arduino Sketches and how to implement an authentication scheme. |
|---|---|
| AbstractList | The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even spanning thousands of miles. Ensuring authentication, communication integrity, and confidentiality for IoT devices is essential for systems security and still an open challenge too. In this context, Physical Unclonable Functions (PUFs) have gained significant attention due to their ability to generate stable, tamper-resistant, and random fingerprints that can be successfully exploited to provide cryptography keys or to implement authentication schemes. However, PUFs necessitate dedicated hardware, making them costly and available only in specific designs, thereby impeding their broader adoption. In this paper, we enable the usage of static random access memory (SRAM)-based PUF on Arduino UNO device, an open-source board implemented upon an ATMega328P, without requiring special hardware. We analyze SRAM PUF quality parameters and how to reconstruct a reliable cryptography key by engineering a fuzzy extractor. Additionally, we design a secure bootloader as root-of-trust and, as a case study, we detail how to authenticate Arduino Sketches and how to implement an authentication scheme. |
| ArticleNumber | 103466 |
| Author | Mazzocca, Nicola Barbareschi, Mario Cirillo, Franco Esposito, Christian |
| Author_xml | – sequence: 1 givenname: Mario surname: Barbareschi fullname: Barbareschi, Mario email: mario.barbareschi@unina.it organization: Dipartimento di Ingegneria Elettrica e delle Tecnologie dell’Informazione - Università degli Studi di Napoli Federico II, Via Claudio 21, Naples, 80125, NA, Italy – sequence: 2 givenname: Franco orcidid: 0009-0006-9599-5996 surname: Cirillo fullname: Cirillo, Franco email: fracirillo@unisa.it organization: Dipartimento di Informatica - Università degli Studi di Salerno, Via Giovanni Paolo II, 132, Fisciano, 84084, SA, Italy – sequence: 3 givenname: Christian surname: Esposito fullname: Esposito, Christian email: esposito@unisa.it organization: Dipartimento di Informatica - Università degli Studi di Salerno, Via Giovanni Paolo II, 132, Fisciano, 84084, SA, Italy – sequence: 4 givenname: Nicola surname: Mazzocca fullname: Mazzocca, Nicola email: nicola.mazzocca@unina.it organization: Dipartimento di Ingegneria Elettrica e delle Tecnologie dell’Informazione - Università degli Studi di Napoli Federico II, Via Claudio 21, Naples, 80125, NA, Italy |
| BookMark | eNp9j8tKw0AUhmdRwbb6Bi7yAmnnkkwmGyGUVgsVRe16mMtJmZDOyEwU-vamxLWrAz_nv3wLNPPBA0IPBK8IJnzdrdIlqWhWFNNylFjB-QzNCRMsrzglt2iRUocxLktC52i99SfnAaLzp-zjvXnJ3467LPisifbb-ZCdnYnBBD_E0PcQ79BNq_oE9393iY677efmOT-8Pu03zSE3DLMhB1YowTVoqrjWda1bsKqshalEyzVj3NYVZ1wUvGTjoxFC64orJawxNS0sW6Jiyh3bU4rQyq_ozipeJMHyCio7OYHKK6icQEfb42SDcduPgyiTceANWBfBDNIG93_ALyyWYa8 |
| Cites_doi | 10.1109/DTIS.2019.8735029 10.3390/s23146307 10.1109/TETC.2014.2300635 10.1016/j.comnet.2010.05.010 10.1109/JIOT.2020.3032757 10.1109/JIOT.2020.3032518 10.1109/JIOT.2018.2864594 10.1109/TETC.2016.2624026 10.3390/s23042034 10.1109/JIOT.2022.3142084 10.1109/ICCTA45985.2018.9499169 10.1007/s13369-021-05358-4 10.1109/JIOT.2019.2935189 10.3390/cryptography4030022 10.1109/ACCESS.2018.2868824 10.1109/TEVC.2021.3081478 10.1109/TCAD.2024.3449570 10.1109/TETC.2019.2935465 |
| ContentType | Journal Article |
| Copyright | 2025 The Authors |
| Copyright_xml | – notice: 2025 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION |
| DOI | 10.1016/j.sysarc.2025.103466 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_sysarc_2025_103466 S1383762125001389 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 6I. 7-5 71M 8P~ AAEDT AAEDW AAFTH AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABFNM ABFRF ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACLOT ACNNM ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADJOM ADMUD ADNMO ADTZH AEBSH AECPX AEFWE AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AGHFR AGQPQ AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BKOMP BLXMC CS3 DU5 EBS EFJIC EFKBS EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 U5U UHS ~G- ~HD 9DU AAYXX CITATION |
| ID | FETCH-LOGICAL-c303t-e34a86beb2a6bb99bfeda598c78f6b336d9763684653a86c88bb76aa8dcc924d3 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001513851000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1383-7621 |
| IngestDate | Sat Nov 29 06:50:46 EST 2025 Sat Sep 27 17:12:26 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Internet of Things (IoT) Physical Unclonable Functions (PUFs) SRAM PUF Arduino UNO Fuzzy extractor Device authentication |
| Language | English |
| License | This is an open access article under the CC BY license. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c303t-e34a86beb2a6bb99bfeda598c78f6b336d9763684653a86c88bb76aa8dcc924d3 |
| ORCID | 0009-0006-9599-5996 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.sysarc.2025.103466 |
| ParticipantIDs | crossref_primary_10_1016_j_sysarc_2025_103466 elsevier_sciencedirect_doi_10_1016_j_sysarc_2025_103466 |
| PublicationCentury | 2000 |
| PublicationDate | October 2025 2025-10-00 |
| PublicationDateYYYYMMDD | 2025-10-01 |
| PublicationDate_xml | – month: 10 year: 2025 text: October 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of systems architecture |
| PublicationYear | 2025 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Schrijen, Van Der Leest (b32) 2012 Chen, Ignatenko, Willems, Maes, van der Sluis, Selimis (b18) 2017 Chen, Willems (b19) 2018; 6 Panahi, Bayılmış, Çavuşoğlu, Kaçar (b4) 2021; 46 Park, Ryu, Kwon, Park (b29) 2023; 23 Anand, Singh (b20) 2024 Barbareschi, Battista, Mazzeo, Venkatesan (b2) 2014 Mall, Amin, Das, Leung, Choo (b8) 2022; 9 Aung, Mashiko, Ismail, Yee (b14) 2020 Mouha, Mennink, Herrewege, Watanabe, Preneel, Verbauwhede (b34) 2014 Korenda, Afghah, Cambou, Philabaum (b17) 2019 Yıldız, Cenk, Onur (b9) 2020; 8 Liu, Lu, Liu, Min, Zeng, Liu (b22) 2018; 6 Cirillo (b37) 2024 Pratihar, Chatterjee, Chakraborty, Mukhopadhyay (b24) 2024; 43 Merli, Schuster, Stumpf, Sigl (b41) 2011 Barbareschi, Battista, Mazzeo, Mazzocca (b12) 2015 Eronen, Krawczyk (b40) 2010 Mall, Amin, Das, Leung, Choo (b38) 2022; 9 Adams, Kramer, Mister, Zuccherato (b39) 2004 Gu, Liu, Cui, Hanley, O’Neill, Lombardi (b27) 2019; 9 Atzori, Iera, Morabito (b1) 2010; 54 Barbareschi (b6) 2017 Amar, Kama, Wang, Oren (b15) 2022 Barbareschi, Cirillo, Esposito (b11) 2024 Meneghello, Calore, Zucchetto, Polese, Zanella (b3) 2019; 6 Farha, Ning, Ali, Chen, Nugent (b10) 2020; 8 Korenda, Afghah, Cambou (b16) 2018 Raj, Bodapati, Chattopadhyay (b28) 2024 M. Barbareschi, S. Barone, A. Mazzeo, N. Mazzocca, Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes, in: 2019 14th International Conference on Design Technology of Integrated Systems in Nanoscale Era, DTIS, 2019, pp. 1–2. . Dwivedi (b35) 2020; 4 Rostami, Majzoobi, Koushanfar, Wallach, Devadas (b26) 2014; 2 Gope, Sikdar (b31) 2022 University of Luxembourg, FELICS block ciphers detailed results, URL Jain, Korenda, Cambou, Lucero (b23) 2024 Gauravaram (b36) 2012 Hori, Yoshida, Katashita, Satoh (b21) 2010 Bhatia, Pandey, Singh, Gupta (b30) 2023; 23 Amelino, Barbareschi, Cilardo (b5) 2016; 6 Wang, Wang, Gu, Cui, O’Neill, Liu (b25) 2021; 10 A. Elmestekawi, A. Tammam, H. Issa, Unclonable key Generator Based on Chip signature and SRAM-PUF of ATmega328P chip, in: 2018 28th International Conference on Computer Theory and Applications, ICCTA, IEEE, pp. 24–29. Mouha (10.1016/j.sysarc.2025.103466_b34) 2014 Anand (10.1016/j.sysarc.2025.103466_b20) 2024 Gope (10.1016/j.sysarc.2025.103466_b31) 2022 10.1016/j.sysarc.2025.103466_b33 Dwivedi (10.1016/j.sysarc.2025.103466_b35) 2020; 4 10.1016/j.sysarc.2025.103466_b13 Panahi (10.1016/j.sysarc.2025.103466_b4) 2021; 46 Meneghello (10.1016/j.sysarc.2025.103466_b3) 2019; 6 Bhatia (10.1016/j.sysarc.2025.103466_b30) 2023; 23 Aung (10.1016/j.sysarc.2025.103466_b14) 2020 Korenda (10.1016/j.sysarc.2025.103466_b17) 2019 Chen (10.1016/j.sysarc.2025.103466_b18) 2017 10.1016/j.sysarc.2025.103466_b7 Barbareschi (10.1016/j.sysarc.2025.103466_b2) 2014 Rostami (10.1016/j.sysarc.2025.103466_b26) 2014; 2 Chen (10.1016/j.sysarc.2025.103466_b19) 2018; 6 Yıldız (10.1016/j.sysarc.2025.103466_b9) 2020; 8 Jain (10.1016/j.sysarc.2025.103466_b23) 2024 Cirillo (10.1016/j.sysarc.2025.103466_b37) 2024 Amelino (10.1016/j.sysarc.2025.103466_b5) 2016; 6 Pratihar (10.1016/j.sysarc.2025.103466_b24) 2024; 43 Park (10.1016/j.sysarc.2025.103466_b29) 2023; 23 Merli (10.1016/j.sysarc.2025.103466_b41) 2011 Korenda (10.1016/j.sysarc.2025.103466_b16) 2018 Barbareschi (10.1016/j.sysarc.2025.103466_b12) 2015 Eronen (10.1016/j.sysarc.2025.103466_b40) 2010 Mall (10.1016/j.sysarc.2025.103466_b38) 2022; 9 Barbareschi (10.1016/j.sysarc.2025.103466_b11) 2024 Hori (10.1016/j.sysarc.2025.103466_b21) 2010 Mall (10.1016/j.sysarc.2025.103466_b8) 2022; 9 Wang (10.1016/j.sysarc.2025.103466_b25) 2021; 10 Schrijen (10.1016/j.sysarc.2025.103466_b32) 2012 Adams (10.1016/j.sysarc.2025.103466_b39) 2004 Liu (10.1016/j.sysarc.2025.103466_b22) 2018; 6 Gu (10.1016/j.sysarc.2025.103466_b27) 2019; 9 Raj (10.1016/j.sysarc.2025.103466_b28) 2024 Barbareschi (10.1016/j.sysarc.2025.103466_b6) 2017 Atzori (10.1016/j.sysarc.2025.103466_b1) 2010; 54 Farha (10.1016/j.sysarc.2025.103466_b10) 2020; 8 Amar (10.1016/j.sysarc.2025.103466_b15) 2022 Gauravaram (10.1016/j.sysarc.2025.103466_b36) 2012 |
| References_xml | – volume: 23 start-page: 6307 year: 2023 ident: b30 article-title: Hash and physical unclonable function (PUF)-based mutual authentication mechanism publication-title: Sensors – year: 2022 ident: b15 article-title: Comment on “SRAM-PUF based entities authentication scheme for resource-constrained IoT devices” publication-title: Cryptol. – start-page: 1 year: 2024 end-page: 10 ident: b11 article-title: SRAM-PUF authentication schemes empowered with blockchain on resource-constrained microcontrollers publication-title: 2024 IEEE 27th International Symposium on Real-Time Distributed Computing – start-page: 1 year: 2019 end-page: 8 ident: b17 article-title: A proof of concept SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices publication-title: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking – reference: M. Barbareschi, S. Barone, A. Mazzeo, N. Mazzocca, Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes, in: 2019 14th International Conference on Design Technology of Integrated Systems in Nanoscale Era, DTIS, 2019, pp. 1–2. – volume: 46 start-page: 4015 year: 2021 end-page: 4037 ident: b4 article-title: Performance evaluation of lightweight encryption algorithms for IoT-based applications publication-title: Arab. J. Sci. Eng. – start-page: 1261 year: 2018 end-page: 1266 ident: b16 article-title: A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions publication-title: 2018 14th International Wireless Communications & Mobile Computing Conference – volume: 23 start-page: 2034 year: 2023 ident: b29 article-title: Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments publication-title: Sensors – volume: 9 start-page: 8205 year: 2022 end-page: 8228 ident: b8 article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: a comprehensive survey publication-title: IEEE Internet Things J. – start-page: 394 year: 2014 end-page: 399 ident: b2 article-title: Advancing wsn physical security adopting tpm-based architectures publication-title: Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) – volume: 10 start-page: 1091 year: 2021 end-page: 1104 ident: b25 article-title: A dynamically configurable PUF and dynamic matching authentication protocol publication-title: IEEE Trans. Emerg. Top. Comput. – year: 2024 ident: b37 article-title: Arduino SRAM-PUF authentication – reference: . University of Luxembourg, FELICS block ciphers detailed results, URL – start-page: 1 year: 2024 end-page: 14 ident: b20 article-title: Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network publication-title: Proc. Indian Nat. Sci. Acad. – start-page: 1319 year: 2012 end-page: 1324 ident: b32 article-title: Comparative analysis of SRAM memories used as PUF primitives publication-title: 2012 Design, Automation & Test in Europe Conference & Exhibition – volume: 43 start-page: 3491 year: 2024 end-page: 3502 ident: b24 article-title: Enhancing SRAM-based PUF reliability through machine learning-aided calibration techniques publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. – volume: 4 start-page: 22 year: 2020 ident: b35 article-title: Security analysis of lightweight IoT cipher: Chaskey publication-title: Cryptography – start-page: 441 year: 2020 end-page: 450 ident: b14 article-title: Evaluation of SRAM PUF characteristics and generation of stable bits for IoT security publication-title: Emerging Trends in Intelligent Computing and Informatics: Data Science, Intelligent Information Systems and Smart Computing 4 – volume: 6 start-page: 49576 year: 2018 end-page: 49587 ident: b22 article-title: A novel security key generation method for SRAM PUF based on Fourier analysis publication-title: IEEE Access – start-page: 1 year: 2024 end-page: 5 ident: b28 article-title: PUF-based lightweight mutual authentication protocol for internet of things (IoT) devices publication-title: 2024 IEEE International Symposium on Circuits and Systems (ISCAS) – volume: 8 start-page: 5682 year: 2020 end-page: 5696 ident: b9 article-title: PLGAKD: A PUF-based lightweight group authentication and key distribution protocol publication-title: IEEE Internet Things J. – volume: 6 start-page: 8182 year: 2019 end-page: 8201 ident: b3 article-title: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices publication-title: IEEE Internet Things J. – start-page: 478 year: 2024 end-page: 498 ident: b23 article-title: Secure content protection schemes for industrial IoT with SRAM PUF-based one-time use cryptographic keys publication-title: Science and Information Conference – year: 2010 ident: b40 article-title: Hmac-based extract-and-expand key derivation function (hkdf) – start-page: 1 year: 2015 end-page: 6 ident: b12 article-title: Testing 90 nm microcontroller SRAM PUF quality publication-title: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era – volume: 6 start-page: 258 year: 2016 end-page: 268 ident: b5 article-title: An IP core remote anonymous activation protocol publication-title: IEEE Trans. Emerg. Top. Comput. – volume: 54 start-page: 2787 year: 2010 end-page: 2805 ident: b1 article-title: The internet of things: A survey publication-title: Comput. Netw. – start-page: 306 year: 2014 end-page: 323 ident: b34 article-title: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers publication-title: International Conference on Selected Areas in Cryptography – start-page: 1 year: 2017 end-page: 6 ident: b18 article-title: A robust SRAM-PUF key generation scheme based on polar codes publication-title: GLOBECOM 2017-2017 IEEE Global Communications Conference – volume: 9 start-page: 8205 year: 2022 end-page: 8228 ident: b38 article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey publication-title: IEEE Internet Things J. – start-page: 33 year: 2011 end-page: 47 ident: b41 article-title: Side-channel analysis of PUFs and fuzzy extractors publication-title: Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings 4 – volume: 2 start-page: 37 year: 2014 end-page: 49 ident: b26 article-title: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching publication-title: IEEE Trans. Emerg. Top. Comput. – volume: 9 start-page: 1853 year: 2019 end-page: 1866 ident: b27 article-title: A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation publication-title: IEEE Trans. Emerg. Top. Comput. – reference: . – reference: A. Elmestekawi, A. Tammam, H. Issa, Unclonable key Generator Based on Chip signature and SRAM-PUF of ATmega328P chip, in: 2018 28th International Conference on Computer Theory and Applications, ICCTA, IEEE, pp. 24–29. – start-page: 134 year: 2004 end-page: 145 ident: b39 article-title: On the security of key derivation functions publication-title: International Conference on Information Security – volume: 8 start-page: 5904 year: 2020 end-page: 5913 ident: b10 article-title: SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices publication-title: IEEE Internet Things J. – start-page: 189 year: 2017 end-page: 209 ident: b6 article-title: Notions on silicon physically unclonable functions publication-title: Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment – start-page: 298 year: 2010 end-page: 303 ident: b21 article-title: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs publication-title: 2010 International Conference on Reconfigurable Computing and FPGAs – start-page: 453 year: 2022 end-page: 459 ident: b31 article-title: A reconfigurable and secure firmware updating framework for advanced metering infrastructure publication-title: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) – start-page: 25 year: 2012 end-page: 30 ident: b36 article-title: Security analysis of salt password hashes publication-title: 2012 International Conference on Advanced Computer Science Applications and Technologies – volume: 6 start-page: 435 year: 2018 end-page: 445 ident: b19 article-title: Secret key generation over biased physical unclonable functions with polar codes publication-title: IEEE Internet Things J. – start-page: 394 year: 2014 ident: 10.1016/j.sysarc.2025.103466_b2 article-title: Advancing wsn physical security adopting tpm-based architectures – ident: 10.1016/j.sysarc.2025.103466_b7 doi: 10.1109/DTIS.2019.8735029 – start-page: 298 year: 2010 ident: 10.1016/j.sysarc.2025.103466_b21 article-title: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs – ident: 10.1016/j.sysarc.2025.103466_b33 – volume: 23 start-page: 6307 issue: 14 year: 2023 ident: 10.1016/j.sysarc.2025.103466_b30 article-title: Hash and physical unclonable function (PUF)-based mutual authentication mechanism publication-title: Sensors doi: 10.3390/s23146307 – start-page: 1 year: 2017 ident: 10.1016/j.sysarc.2025.103466_b18 article-title: A robust SRAM-PUF key generation scheme based on polar codes – start-page: 1 year: 2024 ident: 10.1016/j.sysarc.2025.103466_b20 article-title: Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network publication-title: Proc. Indian Nat. Sci. Acad. – volume: 2 start-page: 37 issue: 1 year: 2014 ident: 10.1016/j.sysarc.2025.103466_b26 article-title: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2014.2300635 – volume: 54 start-page: 2787 issue: 15 year: 2010 ident: 10.1016/j.sysarc.2025.103466_b1 article-title: The internet of things: A survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2010.05.010 – start-page: 1 year: 2024 ident: 10.1016/j.sysarc.2025.103466_b28 article-title: PUF-based lightweight mutual authentication protocol for internet of things (IoT) devices – start-page: 25 year: 2012 ident: 10.1016/j.sysarc.2025.103466_b36 article-title: Security analysis of salt password hashes – volume: 8 start-page: 5682 issue: 7 year: 2020 ident: 10.1016/j.sysarc.2025.103466_b9 article-title: PLGAKD: A PUF-based lightweight group authentication and key distribution protocol publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3032757 – volume: 8 start-page: 5904 issue: 7 year: 2020 ident: 10.1016/j.sysarc.2025.103466_b10 article-title: SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3032518 – volume: 6 start-page: 435 issue: 1 year: 2018 ident: 10.1016/j.sysarc.2025.103466_b19 article-title: Secret key generation over biased physical unclonable functions with polar codes publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2018.2864594 – volume: 6 start-page: 258 issue: 2 year: 2016 ident: 10.1016/j.sysarc.2025.103466_b5 article-title: An IP core remote anonymous activation protocol publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2016.2624026 – start-page: 453 year: 2022 ident: 10.1016/j.sysarc.2025.103466_b31 article-title: A reconfigurable and secure firmware updating framework for advanced metering infrastructure – start-page: 1261 year: 2018 ident: 10.1016/j.sysarc.2025.103466_b16 article-title: A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions – start-page: 1 year: 2024 ident: 10.1016/j.sysarc.2025.103466_b11 article-title: SRAM-PUF authentication schemes empowered with blockchain on resource-constrained microcontrollers – start-page: 1 year: 2015 ident: 10.1016/j.sysarc.2025.103466_b12 article-title: Testing 90 nm microcontroller SRAM PUF quality – start-page: 478 year: 2024 ident: 10.1016/j.sysarc.2025.103466_b23 article-title: Secure content protection schemes for industrial IoT with SRAM PUF-based one-time use cryptographic keys – volume: 23 start-page: 2034 issue: 4 year: 2023 ident: 10.1016/j.sysarc.2025.103466_b29 article-title: Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments publication-title: Sensors doi: 10.3390/s23042034 – start-page: 1319 year: 2012 ident: 10.1016/j.sysarc.2025.103466_b32 article-title: Comparative analysis of SRAM memories used as PUF primitives – volume: 9 start-page: 8205 issue: 11 year: 2022 ident: 10.1016/j.sysarc.2025.103466_b38 article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3142084 – start-page: 1 year: 2019 ident: 10.1016/j.sysarc.2025.103466_b17 article-title: A proof of concept SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices – ident: 10.1016/j.sysarc.2025.103466_b13 doi: 10.1109/ICCTA45985.2018.9499169 – year: 2022 ident: 10.1016/j.sysarc.2025.103466_b15 article-title: Comment on “SRAM-PUF based entities authentication scheme for resource-constrained IoT devices” publication-title: Cryptol. – start-page: 33 year: 2011 ident: 10.1016/j.sysarc.2025.103466_b41 article-title: Side-channel analysis of PUFs and fuzzy extractors – volume: 46 start-page: 4015 year: 2021 ident: 10.1016/j.sysarc.2025.103466_b4 article-title: Performance evaluation of lightweight encryption algorithms for IoT-based applications publication-title: Arab. J. Sci. Eng. doi: 10.1007/s13369-021-05358-4 – volume: 9 start-page: 8205 issue: 11 year: 2022 ident: 10.1016/j.sysarc.2025.103466_b8 article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: a comprehensive survey publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2022.3142084 – start-page: 441 year: 2020 ident: 10.1016/j.sysarc.2025.103466_b14 article-title: Evaluation of SRAM PUF characteristics and generation of stable bits for IoT security – year: 2024 ident: 10.1016/j.sysarc.2025.103466_b37 – volume: 6 start-page: 8182 issue: 5 year: 2019 ident: 10.1016/j.sysarc.2025.103466_b3 article-title: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2019.2935189 – start-page: 306 year: 2014 ident: 10.1016/j.sysarc.2025.103466_b34 article-title: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers – volume: 4 start-page: 22 issue: 3 year: 2020 ident: 10.1016/j.sysarc.2025.103466_b35 article-title: Security analysis of lightweight IoT cipher: Chaskey publication-title: Cryptography doi: 10.3390/cryptography4030022 – volume: 6 start-page: 49576 year: 2018 ident: 10.1016/j.sysarc.2025.103466_b22 article-title: A novel security key generation method for SRAM PUF based on Fourier analysis publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2868824 – volume: 10 start-page: 1091 issue: 2 year: 2021 ident: 10.1016/j.sysarc.2025.103466_b25 article-title: A dynamically configurable PUF and dynamic matching authentication protocol publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TEVC.2021.3081478 – start-page: 134 year: 2004 ident: 10.1016/j.sysarc.2025.103466_b39 article-title: On the security of key derivation functions – start-page: 189 year: 2017 ident: 10.1016/j.sysarc.2025.103466_b6 article-title: Notions on silicon physically unclonable functions – year: 2010 ident: 10.1016/j.sysarc.2025.103466_b40 – volume: 43 start-page: 3491 issue: 11 year: 2024 ident: 10.1016/j.sysarc.2025.103466_b24 article-title: Enhancing SRAM-based PUF reliability through machine learning-aided calibration techniques publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. doi: 10.1109/TCAD.2024.3449570 – volume: 9 start-page: 1853 issue: 4 year: 2019 ident: 10.1016/j.sysarc.2025.103466_b27 article-title: A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2019.2935465 |
| SSID | ssj0005512 |
| Score | 2.3839524 |
| Snippet | The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 103466 |
| SubjectTerms | Arduino UNO Device authentication Fuzzy extractor Internet of Things (IoT) Physical Unclonable Functions (PUFs) SRAM PUF |
| Title | Engineering SRAM-PUF on Arduino microcontroller |
| URI | https://dx.doi.org/10.1016/j.sysarc.2025.103466 |
| Volume | 167 |
| WOSCitedRecordID | wos001513851000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 1383-7621 databaseCode: AIEXJ dateStart: 19960101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0005512 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELYK7IELr90VhQXlwK1ylySNH8cKFS0IEOKx6i3yq1IQJKi0CPHrmdR2EihCcOASRXk4cb5Pk7Hn8wxCe1InRjNjMDcxwT2TwB4JR1iFyvCIJorOisH8P6FnZ2w45Oet1sivhXm8pXnOnp74_bdCDccA7HLp7BfgrhqFA7APoMMWYIftp4BvZBjsXF70T_H59WEZEuiP9TTLi85dKcFzCvVbp82d905thueHTjPQUM96ljEKA-PizC33sWKuWSwjG2cunDOr2VGdGFh9WFFnNGgQ81Q8PxeAcsVN0ZyNiJJK1-YNKIx4MRjY8JWFtRU3nI0M9-OerbQyZ77tTMJNF_oI3euWD-jWl7_Olv3mL1ZpC71s7Sa1raRlK6ltZQEtAf84GPCl_tFgeFyLgRIbF_dv7xdZzpSA82_zvhPTcEyu1tCKwyzoWyaso5bJN9Cqr9YROOP9E_1tECPwxAiKPHDECN4Q4xe6PhxcHfzDrlwGVuCHTLCJe4IRaWQkiJScy5HRIuFMUTYiMo6JBtczJqzMqAcXKsakpEQIppWCUbiOf6PFvMjNJgq4AEsOAwFFdNwzisgwoQJ8UaWjaJ9q2UbY9z-9t1lR0o--extR_5FS59lZjy0F5D-8c-uLT9pGyzUt_6DFyXhqdtAP9TjJHsa7DvYX2ktxvw |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Engineering+SRAM-PUF+on+Arduino+microcontroller&rft.jtitle=Journal+of+systems+architecture&rft.au=Barbareschi%2C+Mario&rft.au=Cirillo%2C+Franco&rft.au=Esposito%2C+Christian&rft.au=Mazzocca%2C+Nicola&rft.date=2025-10-01&rft.issn=1383-7621&rft.volume=167&rft.spage=103466&rft_id=info:doi/10.1016%2Fj.sysarc.2025.103466&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_sysarc_2025_103466 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-7621&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-7621&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-7621&client=summon |