Challenge-Response Authentication Scheme With Chaotic Lasers

被引:3
|
作者
Annovazzi-Lodi, Valerio [1 ]
Lombardi, Lorenzo [1 ]
Aromataris, Giuseppe [1 ]
机构
[1] Univ Pavia, Dipartimento Ingn Ind & Informaz, I-27100 Pavia, Italy
关键词
Authentication; Semiconductor lasers; Synchronization; Lasers; Security; Chaotic communication; Servers; Optical chaos; communication system security; authentication; synchronization; SEMICONDUCTOR; TRANSMISSION; GENERATION; DEVICE;
D O I
10.1109/JQE.2021.3134966
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we numerically evaluate a hardware-based method for authentication using a pair of twin chaotic lasers. This method belongs to the PUF (Physically Unclonable Function) class; however, it does not require storing the response of the hardware in a database, because both users own the same hardware (one of the twin chaotic lasers), producing, on the fly, the same response, i.e., the same chaotic waveform, when subject to the same stimulus (injection from a third laser) in the same working conditions (local injection, pump current). A bit sequence can be easily obtained from the chaotic waveforms by electronic processing, and authentication consists in comparing the sequences produced by the twin lasers. This scheme is proposed above all for authentication of a client in an unsecure environment to a server in a secure environment, but it can be used also for peer-to-peer authentication. Both the case of open- and close-loop chaotic lasers are considered. Simulations are based on the Lang-Kobayashi model.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] 2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets
    Vapen, Anna
    Shahmehri, Nahid
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2011, 3 (02) : 1 - 18
  • [32] A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains
    Zhang, Xiaoshuai
    Liu, Chao
    Chai, Kok Keong
    Poslad, Stefan
    [J]. SENSORS, 2020, 20 (17) : 1 - 15
  • [33] Practical Challenge-Response for DNS
    Al-Dalky, Rami
    Rabinovich, Michael
    Allman, Mark
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2018, 48 (03) : 20 - 28
  • [34] Practical Challenge-Response for DNS
    Al-Dalky, Rami
    Rabinovich, Michael
    Allman, Mark
    [J]. PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 74 - 74
  • [35] Three way Challenge-Response authentication in smart card Using Elliptic Curve Cryptosystem
    Thinn, Khaing Khaing
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 777 - 780
  • [36] Challenge-Response Behavioral Mobile Authentication: A Comparative Study of Graphical Patterns and Cognitive Games
    Mohamed, Manar
    Shrestha, Prakash
    Saxena, Nitesh
    [J]. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 355 - 365
  • [37] PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks
    Shan, Dan
    Zeng, Kai
    Xiang, Weidong
    Richardson, Paul
    Dong, Yan
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1817 - 1827
  • [38] Enhancing an integer challenge-response protocol
    Albuquerque, Robson de Oliveira
    Villalba, Luis Javier Garcia
    Timoteo de Sousa, Rafael, Jr.
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 526 - +
  • [39] Mechanistic Analysis of Challenge-Response Experiments
    Shotwell, M. S.
    Drake, K. J.
    Sidorov, V. Y.
    Wikswo, J. P.
    [J]. BIOMETRICS, 2013, 69 (03) : 741 - 747
  • [40] Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs
    Khavari, Mani
    Baur, Sebastian
    Boche, Holger
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 575 - 579