Xu et al., 2014 - Google Patents
Secure remote sensing and communication using digital PUFsXu et al., 2014
View PDF- Document ID
- 10302620297357603204
- Author
- Xu T
- Wendt J
- Potkonjak M
- Publication year
- Publication venue
- Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems
External Links
Snippet
Small form, mobile, and remote sensor network systems require secure and ultralow power data collection and communication solutions due to their energy constraints. The physical unclonable function (PUF) has emerged as a popular modern low power security primitive …
- 238000004891 communication 0 title abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Physical unclonable function-based key sharing via machine learning for IoT security | |
US10742421B1 (en) | Methods and systems for anonymous hardware attestation | |
Alioto | Trends in hardware security: From basics to ASICs | |
Gao et al. | PUF-FSM: a controlled strong PUF | |
Wendt et al. | Hardware obfuscation using PUF-based logic | |
Xu et al. | Security of IoT systems: Design challenges and opportunities | |
Anandakumar et al. | FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures | |
Majzoobi et al. | Techniques for design and implementation of secure reconfigurable PUFs | |
KR102709350B1 (en) | Reliability enhancement methods for physically unclonable function bitstring generation | |
Majzoobi et al. | Slender PUF protocol: A lightweight, robust, and secure authentication by substring matching | |
Gu et al. | A flip-flop based arbiter physical unclonable function (APUF) design with high entropy and uniqueness for FPGA implementation | |
Al-Meer et al. | Physical unclonable functions (PUF) for IoT devices | |
Xu et al. | Secure remote sensing and communication using digital PUFs | |
Hemavathy et al. | Arbiter puf—a review of design, composition, and security aspects | |
Wortman et al. | P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices | |
Balan et al. | A PUF-based cryptographic security solution for IoT systems on chip | |
Güneysu | Using data contention in dual-ported memories for security applications | |
Wang et al. | Slate: a secure lightweight entity authentication hardware primitive | |
Lee et al. | Design and implementation of secure cryptographic system on chip for Internet of Things | |
Noor et al. | Defense mechanisms against machine learning modeling attacks on strong physical unclonable functions for iot authentication: a review | |
Yu et al. | Hardware hardening approaches using camouflaging, encryption, and obfuscation | |
Chhabra et al. | Hardware Obfuscation of AES IP Core Using PUFs and PRNG: A Secure Cryptographic Key Generation Solution for Internet-of-Things Applications | |
Majzoobi et al. | FPGA-oriented Security | |
Halak et al. | Security attacks on physically unclonable functions and possible countermeasures | |
Moraitis | FPGA Bitstream Modification: Attacks and Countermeasures |