Abstract: Protecting lightweight networked devices against manipulation or cloning is an important aspect in critical infrastructure, especially when processing and transmitting sensitive data such as ...