Binding IOT to Smart Non-Fungible Tokens Using PUF

PDF Publication Title:

Binding IOT to Smart Non-Fungible Tokens Using PUF ( binding-iot-smart-non-fungible-tokens-using-puf )

Previous Page View | Next Page View | Return to Search List

Text from PDF Page: 022

Sensors 2021, 21, 3119 22 of 23 7. Nawaz, A.; Peña Queralta, J.; Guan, J.; Awais, M.; Gia, T.N.; Bashir, A.K.; Kan, H.; Westerlund, T. Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain. Sensors 2020, 20, 3965. [CrossRef] 8. Omar, A.S.; Basor, O. Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT. Blockchain Cybersecur. Trust. Priv. 2020, 79, 7–31. [CrossRef] 9. Fotiou, N.; Pittaras, I.; Siris, V.A.; Siris, V.A.; Voulgaris, S.; Polyzos, G.C. OAuth 2.0 authorization using blockchain-based tokens. arXiv 2020, arXiv:2001.10461. 10. Hasan, M.; Starly, B. Decentralized cloud manufacturing-as-a-service (CMaaS) platform architecture with configurable digital assets. J. Manuf. Syst. 2020, 56, 157–174. [CrossRef] 11. Westerkamp, M.; Victor, F.; Küpper, A. Tracing manufacturing processes using blockchain-based token compositions. Digit. Commun. Netw. 2020, 6, 167–176. [CrossRef] 12. Jesus, V. Blockchain-enhanced Roots-of-Trust. In Proceedings of the IEEE International Conference on Smart Communications and Networking (SmartNets), Yasmine Hammamet, Tunisia, 16–17 November 2018; pp. 1–7. [CrossRef] 13. Ethereum Improvement Proposals. Available online: https://eips.ethereum.org/erc (accessed on 22 April 2021). 14. Balagurusamy, V.S.; Cabral, C.; Coomaraswamy, S.; Coomaraswamy, S.; Delamarche, E.; Dillenberger, D.; Friedman, D.; Gökce, O.; Hinds, N.; Jelitto, J.; et al. Crypto anchors. IBM J. Res. Dev. 2019, 63, 4:1–4:12. [CrossRef] 15. Gao, Y.; Al-Sarawi, S.F.; Abbott, D. Physical unclonable functions. Nat. Electron. 2020, 3, 81–91. [CrossRef] 16. Arcenegui, J.; Arjona, R.; Baturone, I. Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions. In Proceedings of the International Conference on Applied Cryptography and Network Security; Springer: Berlin/Heidelberg, Germany, 2020; Volume 12418, pp. 24–40. [CrossRef] 17. ESP-IDF Get Starter. Available online: https://docs.espressif.com/projects/esp-idf/en/latest/esp32/ (accessed on 22 April 2021). 18. Remix IDE Online. Available online: https://remix.ethereum.org/ (accessed on 22 April 2021). 19. Metamask Website. Available online: https://metamask.io/ (accessed on 22 April 2021). 20. Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction. Available online: https://limitedresults.com/2019/11/ pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/ (accessed on 22 April 2021). 21. Negka, L.; Gketsios, G.; Anagnostopoulos, N.A.; Spathoulas, G.; Kakarountas, A.; Katznbeisser, S. Employing blockchain and physical unclonable functions for counterfeit IoT devices detection. In Proceedings of the International Conference on Omni-Layer Intelligent Systems (COINS), Crete, Greece, 5–7 May 2019; pp. 172–178. [CrossRef] 22. Islam, M.N.; Kundu, S. Enabling ic traceability via blockchain pegged to embedded puf. ACM Trans. Des. Autom. Electron. Syst. 2019, 24, 1–23. [CrossRef] 23. Xu, X.; Rahman, F.; Shakya, B.; Vassilev, A.; Forte, D.; Tehranipoor, M. Electronics supply chain integrity enabled by blockchain. ACM Trans. Des. Autom. Electron. Syst. (TODAES) 2019, 24, 1–25. [CrossRef] [PubMed] 24. Cui, P.; Dixon, J.; Guin, U.; Dimase, D. A blockchain-based framework for supply chain provenance. IEEE Access 2019, 7, 157113–157125. [CrossRef] 25. Guin, U.; Cui, P.; Skjellum, A. Ensuring proof-of-authenticity of IoT edge devices using blockchain technology. In Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1042–1049. [CrossRef] 26. ISO/IEC DIS 20897-2 Information Security, Cybersecurity and Privacy Protection—Physically Unclonable Functions—Part 2: Test and Evaluation Methods. Available online: https://www.iso.org/standard/76354.html (accessed on 22 April 2021). 27. Chaintoutis, C.; Akriotou, M.; Mesaritakis, C.; Komnios, I.; Karamitros, D.; Fragkos, A.; Syvridis, D. Optical PUFs as physical root of trust for blockchain-driven applications. IET Softw. 2018, 13, 182–186. [CrossRef] 28. Prada-Delgado, M.Á.; Baturone, I.; Dittmann, G.; Jelitto, J.; Kind, A. PUF-derived IoT identities in a zero-knowledge protocol for blockchain. Internet Things 2020, 9, 100057. [CrossRef] 29. Furtak, J. Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept. Sensors 2020, 20, 5012. [CrossRef] [PubMed] 30. Pirker, D.; Fischer, T.; Witschnig, H.; Steger, C. velink-A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 Tokens. In Proceedings of the IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), Zhuhai, China, 8–10 January 2021; pp. 62–67. [CrossRef] 31. ERC-721 Website. Available online: http://www.erc721.org/ (accessed on 22 April 2021). 32. Arjona, R.; Prada-Delgado, M.A.; Arcenegui, J.; Baturone, I. Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions. Sensors 2018, 18, 3352. [CrossRef] 33. Baturone, I.; Prada-Delgado, M.A.; Eiroa, S. Improved generation of identifiers, secret keys, and random numbers from SRAMs. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2653–2668. [CrossRef] 34. Unterluggauer, T.; Werner, M.; Mangard, S. MEAS: Memory encryption and authentication secure against side-channel attacks. J. Cryptogr. Eng. 2019, 9, 137–158. [CrossRef] [PubMed] 35. Secure Boot on ESP32. Available online: https://docs.espressif.com/projects/esp-idf/en/latest/esp32/security/secure-boot-v1 .html (accessed on 22 April 2021). 36. Mongoose OS Website. Available online: https://mongoose-os.com/ (accessed on 22 April 2021).

PDF Image | Binding IOT to Smart Non-Fungible Tokens Using PUF

PDF Search Title:

Binding IOT to Smart Non-Fungible Tokens Using PUF

Original File Name Searched:

sensors-21-03119.pdf

DIY PDF Search: Google It | Yahoo | Bing

NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info

IT XR Project Redstone NFT Available for Sale: NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Be part of the future with this NFT. Can be bought and sold but only one design NFT exists. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info

Infinity Turbine IT XR Project Redstone Design: NFT for sale... NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Includes all rights to this turbine design, including license for Fluid Handling Block I and II for the turbine assembly and housing. The NFT includes the blueprints (cad/cam), revenue streams, and all future development of the IT XR Project Redstone... More Info

Infinity Turbine ROT Radial Outflow Turbine 24 Design and Worldwide Rights: NFT for sale... NFT for the ROT 24 energy turbine. Be part of the future with this NFT. This design can be bought and sold but only one design NFT exists. You may manufacture the unit, or get the revenues from its sale from Infinity Turbine. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info

Infinity Supercritical CO2 10 Liter Extractor Design and Worldwide Rights: The Infinity Supercritical 10L CO2 extractor is for botanical oil extraction, which is rich in terpenes and can produce shelf ready full spectrum oil. With over 5 years of development, this industry leader mature extractor machine has been sold since 2015 and is part of many profitable businesses. The process can also be used for electrowinning, e-waste recycling, and lithium battery recycling, gold mining electronic wastes, precious metals. CO2 can also be used in a reverse fuel cell with nafion to make a gas-to-liquids fuel, such as methanol, ethanol and butanol or ethylene. Supercritical CO2 has also been used for treating nafion to make it more effective catalyst. This NFT is for the purchase of worldwide rights which includes the design. More Info

NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info

Infinity Turbine Products: Special for this month, any plans are $10,000 for complete Cad/Cam blueprints. License is for one build. Try before you buy a production license. May pay by Bitcoin or other Crypto. Products Page... More Info

CONTACT TEL: 608-238-6001 Email: greg@infinityturbine.com (Standard Web Page)