Engineering SRAM-PUF on Arduino microcontroller

The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even spanning thousands of miles. Ensuring authentication, communication integrity, and confidentiality for IoT devices is essential for systems securit...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of systems architecture Ročník 167; s. 103466
Hlavní autori: Barbareschi, Mario, Cirillo, Franco, Esposito, Christian, Mazzocca, Nicola
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier B.V 01.10.2025
Predmet:
ISSN:1383-7621
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even spanning thousands of miles. Ensuring authentication, communication integrity, and confidentiality for IoT devices is essential for systems security and still an open challenge too. In this context, Physical Unclonable Functions (PUFs) have gained significant attention due to their ability to generate stable, tamper-resistant, and random fingerprints that can be successfully exploited to provide cryptography keys or to implement authentication schemes. However, PUFs necessitate dedicated hardware, making them costly and available only in specific designs, thereby impeding their broader adoption. In this paper, we enable the usage of static random access memory (SRAM)-based PUF on Arduino UNO device, an open-source board implemented upon an ATMega328P, without requiring special hardware. We analyze SRAM PUF quality parameters and how to reconstruct a reliable cryptography key by engineering a fuzzy extractor. Additionally, we design a secure bootloader as root-of-trust and, as a case study, we detail how to authenticate Arduino Sketches and how to implement an authentication scheme.
AbstractList The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even spanning thousands of miles. Ensuring authentication, communication integrity, and confidentiality for IoT devices is essential for systems security and still an open challenge too. In this context, Physical Unclonable Functions (PUFs) have gained significant attention due to their ability to generate stable, tamper-resistant, and random fingerprints that can be successfully exploited to provide cryptography keys or to implement authentication schemes. However, PUFs necessitate dedicated hardware, making them costly and available only in specific designs, thereby impeding their broader adoption. In this paper, we enable the usage of static random access memory (SRAM)-based PUF on Arduino UNO device, an open-source board implemented upon an ATMega328P, without requiring special hardware. We analyze SRAM PUF quality parameters and how to reconstruct a reliable cryptography key by engineering a fuzzy extractor. Additionally, we design a secure bootloader as root-of-trust and, as a case study, we detail how to authenticate Arduino Sketches and how to implement an authentication scheme.
ArticleNumber 103466
Author Mazzocca, Nicola
Barbareschi, Mario
Cirillo, Franco
Esposito, Christian
Author_xml – sequence: 1
  givenname: Mario
  surname: Barbareschi
  fullname: Barbareschi, Mario
  email: mario.barbareschi@unina.it
  organization: Dipartimento di Ingegneria Elettrica e delle Tecnologie dell’Informazione - Università degli Studi di Napoli Federico II, Via Claudio 21, Naples, 80125, NA, Italy
– sequence: 2
  givenname: Franco
  orcidid: 0009-0006-9599-5996
  surname: Cirillo
  fullname: Cirillo, Franco
  email: fracirillo@unisa.it
  organization: Dipartimento di Informatica - Università degli Studi di Salerno, Via Giovanni Paolo II, 132, Fisciano, 84084, SA, Italy
– sequence: 3
  givenname: Christian
  surname: Esposito
  fullname: Esposito, Christian
  email: esposito@unisa.it
  organization: Dipartimento di Informatica - Università degli Studi di Salerno, Via Giovanni Paolo II, 132, Fisciano, 84084, SA, Italy
– sequence: 4
  givenname: Nicola
  surname: Mazzocca
  fullname: Mazzocca, Nicola
  email: nicola.mazzocca@unina.it
  organization: Dipartimento di Ingegneria Elettrica e delle Tecnologie dell’Informazione - Università degli Studi di Napoli Federico II, Via Claudio 21, Naples, 80125, NA, Italy
BookMark eNp9j8tKw0AUhmdRwbb6Bi7yAmnnkkwmGyGUVgsVRe16mMtJmZDOyEwU-vamxLWrAz_nv3wLNPPBA0IPBK8IJnzdrdIlqWhWFNNylFjB-QzNCRMsrzglt2iRUocxLktC52i99SfnAaLzp-zjvXnJ3467LPisifbb-ZCdnYnBBD_E0PcQ79BNq_oE9393iY677efmOT-8Pu03zSE3DLMhB1YowTVoqrjWda1bsKqshalEyzVj3NYVZ1wUvGTjoxFC64orJawxNS0sW6Jiyh3bU4rQyq_ozipeJMHyCio7OYHKK6icQEfb42SDcduPgyiTceANWBfBDNIG93_ALyyWYa8
Cites_doi 10.1109/DTIS.2019.8735029
10.3390/s23146307
10.1109/TETC.2014.2300635
10.1016/j.comnet.2010.05.010
10.1109/JIOT.2020.3032757
10.1109/JIOT.2020.3032518
10.1109/JIOT.2018.2864594
10.1109/TETC.2016.2624026
10.3390/s23042034
10.1109/JIOT.2022.3142084
10.1109/ICCTA45985.2018.9499169
10.1007/s13369-021-05358-4
10.1109/JIOT.2019.2935189
10.3390/cryptography4030022
10.1109/ACCESS.2018.2868824
10.1109/TEVC.2021.3081478
10.1109/TCAD.2024.3449570
10.1109/TETC.2019.2935465
ContentType Journal Article
Copyright 2025 The Authors
Copyright_xml – notice: 2025 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.sysarc.2025.103466
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_sysarc_2025_103466
S1383762125001389
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29L
4.4
457
4G.
5GY
5VS
6I.
7-5
71M
8P~
AAEDT
AAEDW
AAFTH
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABWVN
ABXDB
ACDAQ
ACGFO
ACGFS
ACLOT
ACNNM
ACRLP
ACRPL
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADJOM
ADMUD
ADNMO
ADTZH
AEBSH
AECPX
AEFWE
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGQPQ
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BKOMP
BLXMC
CS3
DU5
EBS
EFJIC
EFKBS
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
U5U
UHS
~G-
~HD
9DU
AAYXX
CITATION
ID FETCH-LOGICAL-c303t-e34a86beb2a6bb99bfeda598c78f6b336d9763684653a86c88bb76aa8dcc924d3
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001513851000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1383-7621
IngestDate Sat Nov 29 06:50:46 EST 2025
Sat Sep 27 17:12:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Internet of Things (IoT)
Physical Unclonable Functions (PUFs)
SRAM PUF
Arduino UNO
Fuzzy extractor
Device authentication
Language English
License This is an open access article under the CC BY license.
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c303t-e34a86beb2a6bb99bfeda598c78f6b336d9763684653a86c88bb76aa8dcc924d3
ORCID 0009-0006-9599-5996
OpenAccessLink https://dx.doi.org/10.1016/j.sysarc.2025.103466
ParticipantIDs crossref_primary_10_1016_j_sysarc_2025_103466
elsevier_sciencedirect_doi_10_1016_j_sysarc_2025_103466
PublicationCentury 2000
PublicationDate October 2025
2025-10-00
PublicationDateYYYYMMDD 2025-10-01
PublicationDate_xml – month: 10
  year: 2025
  text: October 2025
PublicationDecade 2020
PublicationTitle Journal of systems architecture
PublicationYear 2025
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Schrijen, Van Der Leest (b32) 2012
Chen, Ignatenko, Willems, Maes, van der Sluis, Selimis (b18) 2017
Chen, Willems (b19) 2018; 6
Panahi, Bayılmış, Çavuşoğlu, Kaçar (b4) 2021; 46
Park, Ryu, Kwon, Park (b29) 2023; 23
Anand, Singh (b20) 2024
Barbareschi, Battista, Mazzeo, Venkatesan (b2) 2014
Mall, Amin, Das, Leung, Choo (b8) 2022; 9
Aung, Mashiko, Ismail, Yee (b14) 2020
Mouha, Mennink, Herrewege, Watanabe, Preneel, Verbauwhede (b34) 2014
Korenda, Afghah, Cambou, Philabaum (b17) 2019
Yıldız, Cenk, Onur (b9) 2020; 8
Liu, Lu, Liu, Min, Zeng, Liu (b22) 2018; 6
Cirillo (b37) 2024
Pratihar, Chatterjee, Chakraborty, Mukhopadhyay (b24) 2024; 43
Merli, Schuster, Stumpf, Sigl (b41) 2011
Barbareschi, Battista, Mazzeo, Mazzocca (b12) 2015
Eronen, Krawczyk (b40) 2010
Mall, Amin, Das, Leung, Choo (b38) 2022; 9
Adams, Kramer, Mister, Zuccherato (b39) 2004
Gu, Liu, Cui, Hanley, O’Neill, Lombardi (b27) 2019; 9
Atzori, Iera, Morabito (b1) 2010; 54
Barbareschi (b6) 2017
Amar, Kama, Wang, Oren (b15) 2022
Barbareschi, Cirillo, Esposito (b11) 2024
Meneghello, Calore, Zucchetto, Polese, Zanella (b3) 2019; 6
Farha, Ning, Ali, Chen, Nugent (b10) 2020; 8
Korenda, Afghah, Cambou (b16) 2018
Raj, Bodapati, Chattopadhyay (b28) 2024
M. Barbareschi, S. Barone, A. Mazzeo, N. Mazzocca, Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes, in: 2019 14th International Conference on Design Technology of Integrated Systems in Nanoscale Era, DTIS, 2019, pp. 1–2.
.
Dwivedi (b35) 2020; 4
Rostami, Majzoobi, Koushanfar, Wallach, Devadas (b26) 2014; 2
Gope, Sikdar (b31) 2022
University of Luxembourg, FELICS block ciphers detailed results, URL
Jain, Korenda, Cambou, Lucero (b23) 2024
Gauravaram (b36) 2012
Hori, Yoshida, Katashita, Satoh (b21) 2010
Bhatia, Pandey, Singh, Gupta (b30) 2023; 23
Amelino, Barbareschi, Cilardo (b5) 2016; 6
Wang, Wang, Gu, Cui, O’Neill, Liu (b25) 2021; 10
A. Elmestekawi, A. Tammam, H. Issa, Unclonable key Generator Based on Chip signature and SRAM-PUF of ATmega328P chip, in: 2018 28th International Conference on Computer Theory and Applications, ICCTA, IEEE, pp. 24–29.
Mouha (10.1016/j.sysarc.2025.103466_b34) 2014
Anand (10.1016/j.sysarc.2025.103466_b20) 2024
Gope (10.1016/j.sysarc.2025.103466_b31) 2022
10.1016/j.sysarc.2025.103466_b33
Dwivedi (10.1016/j.sysarc.2025.103466_b35) 2020; 4
10.1016/j.sysarc.2025.103466_b13
Panahi (10.1016/j.sysarc.2025.103466_b4) 2021; 46
Meneghello (10.1016/j.sysarc.2025.103466_b3) 2019; 6
Bhatia (10.1016/j.sysarc.2025.103466_b30) 2023; 23
Aung (10.1016/j.sysarc.2025.103466_b14) 2020
Korenda (10.1016/j.sysarc.2025.103466_b17) 2019
Chen (10.1016/j.sysarc.2025.103466_b18) 2017
10.1016/j.sysarc.2025.103466_b7
Barbareschi (10.1016/j.sysarc.2025.103466_b2) 2014
Rostami (10.1016/j.sysarc.2025.103466_b26) 2014; 2
Chen (10.1016/j.sysarc.2025.103466_b19) 2018; 6
Yıldız (10.1016/j.sysarc.2025.103466_b9) 2020; 8
Jain (10.1016/j.sysarc.2025.103466_b23) 2024
Cirillo (10.1016/j.sysarc.2025.103466_b37) 2024
Amelino (10.1016/j.sysarc.2025.103466_b5) 2016; 6
Pratihar (10.1016/j.sysarc.2025.103466_b24) 2024; 43
Park (10.1016/j.sysarc.2025.103466_b29) 2023; 23
Merli (10.1016/j.sysarc.2025.103466_b41) 2011
Korenda (10.1016/j.sysarc.2025.103466_b16) 2018
Barbareschi (10.1016/j.sysarc.2025.103466_b12) 2015
Eronen (10.1016/j.sysarc.2025.103466_b40) 2010
Mall (10.1016/j.sysarc.2025.103466_b38) 2022; 9
Barbareschi (10.1016/j.sysarc.2025.103466_b11) 2024
Hori (10.1016/j.sysarc.2025.103466_b21) 2010
Mall (10.1016/j.sysarc.2025.103466_b8) 2022; 9
Wang (10.1016/j.sysarc.2025.103466_b25) 2021; 10
Schrijen (10.1016/j.sysarc.2025.103466_b32) 2012
Adams (10.1016/j.sysarc.2025.103466_b39) 2004
Liu (10.1016/j.sysarc.2025.103466_b22) 2018; 6
Gu (10.1016/j.sysarc.2025.103466_b27) 2019; 9
Raj (10.1016/j.sysarc.2025.103466_b28) 2024
Barbareschi (10.1016/j.sysarc.2025.103466_b6) 2017
Atzori (10.1016/j.sysarc.2025.103466_b1) 2010; 54
Farha (10.1016/j.sysarc.2025.103466_b10) 2020; 8
Amar (10.1016/j.sysarc.2025.103466_b15) 2022
Gauravaram (10.1016/j.sysarc.2025.103466_b36) 2012
References_xml – volume: 23
  start-page: 6307
  year: 2023
  ident: b30
  article-title: Hash and physical unclonable function (PUF)-based mutual authentication mechanism
  publication-title: Sensors
– year: 2022
  ident: b15
  article-title: Comment on “SRAM-PUF based entities authentication scheme for resource-constrained IoT devices”
  publication-title: Cryptol.
– start-page: 1
  year: 2024
  end-page: 10
  ident: b11
  article-title: SRAM-PUF authentication schemes empowered with blockchain on resource-constrained microcontrollers
  publication-title: 2024 IEEE 27th International Symposium on Real-Time Distributed Computing
– start-page: 1
  year: 2019
  end-page: 8
  ident: b17
  article-title: A proof of concept SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices
  publication-title: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking
– reference: M. Barbareschi, S. Barone, A. Mazzeo, N. Mazzocca, Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes, in: 2019 14th International Conference on Design Technology of Integrated Systems in Nanoscale Era, DTIS, 2019, pp. 1–2.
– volume: 46
  start-page: 4015
  year: 2021
  end-page: 4037
  ident: b4
  article-title: Performance evaluation of lightweight encryption algorithms for IoT-based applications
  publication-title: Arab. J. Sci. Eng.
– start-page: 1261
  year: 2018
  end-page: 1266
  ident: b16
  article-title: A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions
  publication-title: 2018 14th International Wireless Communications & Mobile Computing Conference
– volume: 23
  start-page: 2034
  year: 2023
  ident: b29
  article-title: Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments
  publication-title: Sensors
– volume: 9
  start-page: 8205
  year: 2022
  end-page: 8228
  ident: b8
  article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: a comprehensive survey
  publication-title: IEEE Internet Things J.
– start-page: 394
  year: 2014
  end-page: 399
  ident: b2
  article-title: Advancing wsn physical security adopting tpm-based architectures
  publication-title: Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)
– volume: 10
  start-page: 1091
  year: 2021
  end-page: 1104
  ident: b25
  article-title: A dynamically configurable PUF and dynamic matching authentication protocol
  publication-title: IEEE Trans. Emerg. Top. Comput.
– year: 2024
  ident: b37
  article-title: Arduino SRAM-PUF authentication
– reference: . University of Luxembourg, FELICS block ciphers detailed results, URL
– start-page: 1
  year: 2024
  end-page: 14
  ident: b20
  article-title: Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network
  publication-title: Proc. Indian Nat. Sci. Acad.
– start-page: 1319
  year: 2012
  end-page: 1324
  ident: b32
  article-title: Comparative analysis of SRAM memories used as PUF primitives
  publication-title: 2012 Design, Automation & Test in Europe Conference & Exhibition
– volume: 43
  start-page: 3491
  year: 2024
  end-page: 3502
  ident: b24
  article-title: Enhancing SRAM-based PUF reliability through machine learning-aided calibration techniques
  publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.
– volume: 4
  start-page: 22
  year: 2020
  ident: b35
  article-title: Security analysis of lightweight IoT cipher: Chaskey
  publication-title: Cryptography
– start-page: 441
  year: 2020
  end-page: 450
  ident: b14
  article-title: Evaluation of SRAM PUF characteristics and generation of stable bits for IoT security
  publication-title: Emerging Trends in Intelligent Computing and Informatics: Data Science, Intelligent Information Systems and Smart Computing 4
– volume: 6
  start-page: 49576
  year: 2018
  end-page: 49587
  ident: b22
  article-title: A novel security key generation method for SRAM PUF based on Fourier analysis
  publication-title: IEEE Access
– start-page: 1
  year: 2024
  end-page: 5
  ident: b28
  article-title: PUF-based lightweight mutual authentication protocol for internet of things (IoT) devices
  publication-title: 2024 IEEE International Symposium on Circuits and Systems (ISCAS)
– volume: 8
  start-page: 5682
  year: 2020
  end-page: 5696
  ident: b9
  article-title: PLGAKD: A PUF-based lightweight group authentication and key distribution protocol
  publication-title: IEEE Internet Things J.
– volume: 6
  start-page: 8182
  year: 2019
  end-page: 8201
  ident: b3
  article-title: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
  publication-title: IEEE Internet Things J.
– start-page: 478
  year: 2024
  end-page: 498
  ident: b23
  article-title: Secure content protection schemes for industrial IoT with SRAM PUF-based one-time use cryptographic keys
  publication-title: Science and Information Conference
– year: 2010
  ident: b40
  article-title: Hmac-based extract-and-expand key derivation function (hkdf)
– start-page: 1
  year: 2015
  end-page: 6
  ident: b12
  article-title: Testing 90 nm microcontroller SRAM PUF quality
  publication-title: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era
– volume: 6
  start-page: 258
  year: 2016
  end-page: 268
  ident: b5
  article-title: An IP core remote anonymous activation protocol
  publication-title: IEEE Trans. Emerg. Top. Comput.
– volume: 54
  start-page: 2787
  year: 2010
  end-page: 2805
  ident: b1
  article-title: The internet of things: A survey
  publication-title: Comput. Netw.
– start-page: 306
  year: 2014
  end-page: 323
  ident: b34
  article-title: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
  publication-title: International Conference on Selected Areas in Cryptography
– start-page: 1
  year: 2017
  end-page: 6
  ident: b18
  article-title: A robust SRAM-PUF key generation scheme based on polar codes
  publication-title: GLOBECOM 2017-2017 IEEE Global Communications Conference
– volume: 9
  start-page: 8205
  year: 2022
  end-page: 8228
  ident: b38
  article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
  publication-title: IEEE Internet Things J.
– start-page: 33
  year: 2011
  end-page: 47
  ident: b41
  article-title: Side-channel analysis of PUFs and fuzzy extractors
  publication-title: Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings 4
– volume: 2
  start-page: 37
  year: 2014
  end-page: 49
  ident: b26
  article-title: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching
  publication-title: IEEE Trans. Emerg. Top. Comput.
– volume: 9
  start-page: 1853
  year: 2019
  end-page: 1866
  ident: b27
  article-title: A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation
  publication-title: IEEE Trans. Emerg. Top. Comput.
– reference: .
– reference: A. Elmestekawi, A. Tammam, H. Issa, Unclonable key Generator Based on Chip signature and SRAM-PUF of ATmega328P chip, in: 2018 28th International Conference on Computer Theory and Applications, ICCTA, IEEE, pp. 24–29.
– start-page: 134
  year: 2004
  end-page: 145
  ident: b39
  article-title: On the security of key derivation functions
  publication-title: International Conference on Information Security
– volume: 8
  start-page: 5904
  year: 2020
  end-page: 5913
  ident: b10
  article-title: SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices
  publication-title: IEEE Internet Things J.
– start-page: 189
  year: 2017
  end-page: 209
  ident: b6
  article-title: Notions on silicon physically unclonable functions
  publication-title: Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment
– start-page: 298
  year: 2010
  end-page: 303
  ident: b21
  article-title: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs
  publication-title: 2010 International Conference on Reconfigurable Computing and FPGAs
– start-page: 453
  year: 2022
  end-page: 459
  ident: b31
  article-title: A reconfigurable and secure firmware updating framework for advanced metering infrastructure
  publication-title: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
– start-page: 25
  year: 2012
  end-page: 30
  ident: b36
  article-title: Security analysis of salt password hashes
  publication-title: 2012 International Conference on Advanced Computer Science Applications and Technologies
– volume: 6
  start-page: 435
  year: 2018
  end-page: 445
  ident: b19
  article-title: Secret key generation over biased physical unclonable functions with polar codes
  publication-title: IEEE Internet Things J.
– start-page: 394
  year: 2014
  ident: 10.1016/j.sysarc.2025.103466_b2
  article-title: Advancing wsn physical security adopting tpm-based architectures
– ident: 10.1016/j.sysarc.2025.103466_b7
  doi: 10.1109/DTIS.2019.8735029
– start-page: 298
  year: 2010
  ident: 10.1016/j.sysarc.2025.103466_b21
  article-title: Quantitative and statistical performance evaluation of arbiter physical unclonable functions on FPGAs
– ident: 10.1016/j.sysarc.2025.103466_b33
– volume: 23
  start-page: 6307
  issue: 14
  year: 2023
  ident: 10.1016/j.sysarc.2025.103466_b30
  article-title: Hash and physical unclonable function (PUF)-based mutual authentication mechanism
  publication-title: Sensors
  doi: 10.3390/s23146307
– start-page: 1
  year: 2017
  ident: 10.1016/j.sysarc.2025.103466_b18
  article-title: A robust SRAM-PUF key generation scheme based on polar codes
– start-page: 1
  year: 2024
  ident: 10.1016/j.sysarc.2025.103466_b20
  article-title: Generating hash value at edge device using SRAM-PUF and autoencoder in IoT network
  publication-title: Proc. Indian Nat. Sci. Acad.
– volume: 2
  start-page: 37
  issue: 1
  year: 2014
  ident: 10.1016/j.sysarc.2025.103466_b26
  article-title: Robust and reverse-engineering resilient PUF authentication and key-exchange by substring matching
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2014.2300635
– volume: 54
  start-page: 2787
  issue: 15
  year: 2010
  ident: 10.1016/j.sysarc.2025.103466_b1
  article-title: The internet of things: A survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2010.05.010
– start-page: 1
  year: 2024
  ident: 10.1016/j.sysarc.2025.103466_b28
  article-title: PUF-based lightweight mutual authentication protocol for internet of things (IoT) devices
– start-page: 25
  year: 2012
  ident: 10.1016/j.sysarc.2025.103466_b36
  article-title: Security analysis of salt password hashes
– volume: 8
  start-page: 5682
  issue: 7
  year: 2020
  ident: 10.1016/j.sysarc.2025.103466_b9
  article-title: PLGAKD: A PUF-based lightweight group authentication and key distribution protocol
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3032757
– volume: 8
  start-page: 5904
  issue: 7
  year: 2020
  ident: 10.1016/j.sysarc.2025.103466_b10
  article-title: SRAM-PUF-based entities authentication scheme for resource-constrained IoT devices
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3032518
– volume: 6
  start-page: 435
  issue: 1
  year: 2018
  ident: 10.1016/j.sysarc.2025.103466_b19
  article-title: Secret key generation over biased physical unclonable functions with polar codes
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2864594
– volume: 6
  start-page: 258
  issue: 2
  year: 2016
  ident: 10.1016/j.sysarc.2025.103466_b5
  article-title: An IP core remote anonymous activation protocol
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2016.2624026
– start-page: 453
  year: 2022
  ident: 10.1016/j.sysarc.2025.103466_b31
  article-title: A reconfigurable and secure firmware updating framework for advanced metering infrastructure
– start-page: 1261
  year: 2018
  ident: 10.1016/j.sysarc.2025.103466_b16
  article-title: A secret key generation scheme for internet of things using ternary-states ReRAM-based physical unclonable functions
– start-page: 1
  year: 2024
  ident: 10.1016/j.sysarc.2025.103466_b11
  article-title: SRAM-PUF authentication schemes empowered with blockchain on resource-constrained microcontrollers
– start-page: 1
  year: 2015
  ident: 10.1016/j.sysarc.2025.103466_b12
  article-title: Testing 90 nm microcontroller SRAM PUF quality
– start-page: 478
  year: 2024
  ident: 10.1016/j.sysarc.2025.103466_b23
  article-title: Secure content protection schemes for industrial IoT with SRAM PUF-based one-time use cryptographic keys
– volume: 23
  start-page: 2034
  issue: 4
  year: 2023
  ident: 10.1016/j.sysarc.2025.103466_b29
  article-title: Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments
  publication-title: Sensors
  doi: 10.3390/s23042034
– start-page: 1319
  year: 2012
  ident: 10.1016/j.sysarc.2025.103466_b32
  article-title: Comparative analysis of SRAM memories used as PUF primitives
– volume: 9
  start-page: 8205
  issue: 11
  year: 2022
  ident: 10.1016/j.sysarc.2025.103466_b38
  article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2022.3142084
– start-page: 1
  year: 2019
  ident: 10.1016/j.sysarc.2025.103466_b17
  article-title: A proof of concept SRAM-based physically unclonable function (PUF) key generation mechanism for IoT devices
– ident: 10.1016/j.sysarc.2025.103466_b13
  doi: 10.1109/ICCTA45985.2018.9499169
– year: 2022
  ident: 10.1016/j.sysarc.2025.103466_b15
  article-title: Comment on “SRAM-PUF based entities authentication scheme for resource-constrained IoT devices”
  publication-title: Cryptol.
– start-page: 33
  year: 2011
  ident: 10.1016/j.sysarc.2025.103466_b41
  article-title: Side-channel analysis of PUFs and fuzzy extractors
– volume: 46
  start-page: 4015
  year: 2021
  ident: 10.1016/j.sysarc.2025.103466_b4
  article-title: Performance evaluation of lightweight encryption algorithms for IoT-based applications
  publication-title: Arab. J. Sci. Eng.
  doi: 10.1007/s13369-021-05358-4
– volume: 9
  start-page: 8205
  issue: 11
  year: 2022
  ident: 10.1016/j.sysarc.2025.103466_b8
  article-title: PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: a comprehensive survey
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2022.3142084
– start-page: 441
  year: 2020
  ident: 10.1016/j.sysarc.2025.103466_b14
  article-title: Evaluation of SRAM PUF characteristics and generation of stable bits for IoT security
– year: 2024
  ident: 10.1016/j.sysarc.2025.103466_b37
– volume: 6
  start-page: 8182
  issue: 5
  year: 2019
  ident: 10.1016/j.sysarc.2025.103466_b3
  article-title: IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2935189
– start-page: 306
  year: 2014
  ident: 10.1016/j.sysarc.2025.103466_b34
  article-title: Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
– volume: 4
  start-page: 22
  issue: 3
  year: 2020
  ident: 10.1016/j.sysarc.2025.103466_b35
  article-title: Security analysis of lightweight IoT cipher: Chaskey
  publication-title: Cryptography
  doi: 10.3390/cryptography4030022
– volume: 6
  start-page: 49576
  year: 2018
  ident: 10.1016/j.sysarc.2025.103466_b22
  article-title: A novel security key generation method for SRAM PUF based on Fourier analysis
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2868824
– volume: 10
  start-page: 1091
  issue: 2
  year: 2021
  ident: 10.1016/j.sysarc.2025.103466_b25
  article-title: A dynamically configurable PUF and dynamic matching authentication protocol
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TEVC.2021.3081478
– start-page: 134
  year: 2004
  ident: 10.1016/j.sysarc.2025.103466_b39
  article-title: On the security of key derivation functions
– start-page: 189
  year: 2017
  ident: 10.1016/j.sysarc.2025.103466_b6
  article-title: Notions on silicon physically unclonable functions
– year: 2010
  ident: 10.1016/j.sysarc.2025.103466_b40
– volume: 43
  start-page: 3491
  issue: 11
  year: 2024
  ident: 10.1016/j.sysarc.2025.103466_b24
  article-title: Enhancing SRAM-based PUF reliability through machine learning-aided calibration techniques
  publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.
  doi: 10.1109/TCAD.2024.3449570
– volume: 9
  start-page: 1853
  issue: 4
  year: 2019
  ident: 10.1016/j.sysarc.2025.103466_b27
  article-title: A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2019.2935465
SSID ssj0005512
Score 2.3839524
Snippet The emergence of the Internet of Things (IoT) enables both people and devices to access services, data, and actuator control from remote locations, even...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 103466
SubjectTerms Arduino UNO
Device authentication
Fuzzy extractor
Internet of Things (IoT)
Physical Unclonable Functions (PUFs)
SRAM PUF
Title Engineering SRAM-PUF on Arduino microcontroller
URI https://dx.doi.org/10.1016/j.sysarc.2025.103466
Volume 167
WOSCitedRecordID wos001513851000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 1383-7621
  databaseCode: AIEXJ
  dateStart: 19960101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0005512
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELYK7IELr90VhQXlwK1ylySNH8cKFS0IEOKx6i3yq1IQJKi0CPHrmdR2EihCcOASRXk4cb5Pk7Hn8wxCe1InRjNjMDcxwT2TwB4JR1iFyvCIJorOisH8P6FnZ2w45Oet1sivhXm8pXnOnp74_bdCDccA7HLp7BfgrhqFA7APoMMWYIftp4BvZBjsXF70T_H59WEZEuiP9TTLi85dKcFzCvVbp82d905thueHTjPQUM96ljEKA-PizC33sWKuWSwjG2cunDOr2VGdGFh9WFFnNGgQ81Q8PxeAcsVN0ZyNiJJK1-YNKIx4MRjY8JWFtRU3nI0M9-OerbQyZ77tTMJNF_oI3euWD-jWl7_Olv3mL1ZpC71s7Sa1raRlK6ltZQEtAf84GPCl_tFgeFyLgRIbF_dv7xdZzpSA82_zvhPTcEyu1tCKwyzoWyaso5bJN9Cqr9YROOP9E_1tECPwxAiKPHDECN4Q4xe6PhxcHfzDrlwGVuCHTLCJe4IRaWQkiJScy5HRIuFMUTYiMo6JBtczJqzMqAcXKsakpEQIppWCUbiOf6PFvMjNJgq4AEsOAwFFdNwzisgwoQJ8UaWjaJ9q2UbY9z-9t1lR0o--extR_5FS59lZjy0F5D-8c-uLT9pGyzUt_6DFyXhqdtAP9TjJHsa7DvYX2ktxvw
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Engineering+SRAM-PUF+on+Arduino+microcontroller&rft.jtitle=Journal+of+systems+architecture&rft.au=Barbareschi%2C+Mario&rft.au=Cirillo%2C+Franco&rft.au=Esposito%2C+Christian&rft.au=Mazzocca%2C+Nicola&rft.date=2025-10-01&rft.issn=1383-7621&rft.volume=167&rft.spage=103466&rft_id=info:doi/10.1016%2Fj.sysarc.2025.103466&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_sysarc_2025_103466
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-7621&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-7621&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-7621&client=summon