Challenge-Response Authentication Scheme With Chaotic Lasers

被引:3
|
作者
Annovazzi-Lodi, Valerio [1 ]
Lombardi, Lorenzo [1 ]
Aromataris, Giuseppe [1 ]
机构
[1] Univ Pavia, Dipartimento Ingn Ind & Informaz, I-27100 Pavia, Italy
关键词
Authentication; Semiconductor lasers; Synchronization; Lasers; Security; Chaotic communication; Servers; Optical chaos; communication system security; authentication; synchronization; SEMICONDUCTOR; TRANSMISSION; GENERATION; DEVICE;
D O I
10.1109/JQE.2021.3134966
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we numerically evaluate a hardware-based method for authentication using a pair of twin chaotic lasers. This method belongs to the PUF (Physically Unclonable Function) class; however, it does not require storing the response of the hardware in a database, because both users own the same hardware (one of the twin chaotic lasers), producing, on the fly, the same response, i.e., the same chaotic waveform, when subject to the same stimulus (injection from a third laser) in the same working conditions (local injection, pump current). A bit sequence can be easily obtained from the chaotic waveforms by electronic processing, and authentication consists in comparing the sequences produced by the twin lasers. This scheme is proposed above all for authentication of a client in an unsecure environment to a server in a secure environment, but it can be used also for peer-to-peer authentication. Both the case of open- and close-loop chaotic lasers are considered. Simulations are based on the Lang-Kobayashi model.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] LIMITATIONS OF CHALLENGE-RESPONSE ENTITY AUTHENTICATION
    MITCHELL, C
    [J]. ELECTRONICS LETTERS, 1989, 25 (17) : 1195 - 1196
  • [2] Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy
    Kuo, Wen-Chung
    Chen, Bae-Ling
    Wuu, Lih-Chyau
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 105 - 112
  • [3] ENTITY AUTHENTICATION BASED ON CHALLENGE-RESPONSE TECHNIQUES
    Oros, Horea
    Boian, Florian M.
    [J]. KEPT 2009: KNOWLEDGE ENGINEERING PRINCIPLES AND TECHNIQUES, 2009, : 373 - +
  • [4] Challenge-response based ACK message authentication
    Park, Min-Ho
    [J]. ELECTRONICS LETTERS, 2012, 48 (16) : 1021 - 1022
  • [5] Analysis of Challenge-Response Authentication in a Networked Control System
    Rzasa, Wojciech
    Rzonca, Dariusz
    Stec, Andrzej
    Trybus, Bartosz
    [J]. COMPUTER NETWORKS, 2012, 291 : 271 - 279
  • [6] 2-clickAuth - Optical Challenge-Response Authentication
    Vapen, Anna
    Byers, David
    Shahmehri, Nahid
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 79 - 86
  • [7] Analysis of Challenge-Response Authentication with Reconfigurable Intelligent Surfaces
    Tomasin, Stefano
    Elwakeel, Tarek N. M. M.
    Guglielmi, Anna Valeria
    Maes, Robin
    Noels, Nele
    Moeneclaey, Marc
    [J]. IEEE Transactions on Information Forensics and Security, 2024, 19 : 9494 - 9507
  • [8] Off-Path Hacking: The Illusion of Challenge-Response Authentication
    Gilad, Yossi
    Herzberg, Amir
    Shulman, Haya
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 68 - 77
  • [9] VELODY: Nonlinear Vibration Challenge-Response for Resilient User Authentication
    Li, Jingjie
    Fawaz, Kassem
    Kim, Younghyun
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1201 - 1213
  • [10] Physical Layer Challenge-Response Authentication in Wireless Networks with Relay
    Du, Xianru
    Shan, Dan
    Zeng, Kai
    Huie, Lauren
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1276 - 1284