Functional mobile-based two-factor authentication by photonic physical unclonable functions

被引:3
|
作者
Silverio, Tiago [1 ]
Dias, Lilia M. S. [1 ]
Ramalho, Joao F. C. B. [1 ]
Correia, Sandra F. H. [2 ]
Fu, Lianshe [1 ]
Ferreira, Rute A. S. [1 ]
Andre, Paulo S. [2 ,3 ,4 ]
机构
[1] Univ Aveiro, CICECO Aveiro Inst Mat, Phys Dept, P-3810193 Aveiro, Portugal
[2] Univ Aveiro, Inst Telecomunicacoes, P-3810193 Aveiro, Portugal
[3] Univ Lisbon, Inst Super Tecn, Dept Elect & Comp Engn, P-1049001 Lisbon, Portugal
[4] Univ Lisbon, Inst Super Tecn, Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
基金
瑞典研究理事会;
关键词
ORGANICALLY MODIFIED SILICATES; ROBUST; PUF;
D O I
10.1063/5.0101483
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
Given the rapid expansion of the Internet of Things and because of the concerns around counterfeited goods, secure and resilient cryptographic systems are in high demand. Due to the development of digital ecosystems, mobile applications for transactions require fast and reliable methods to generate secure cryptographic keys, such as Physical Unclonable Functions (PUFs). We demonstrate a compact and reliable photonic PUF device able to be applied in mobile-based authentication. A miniaturized, energy-efficient, and low-cost token was forged of flexible luminescent organic-inorganic hybrid materials doped with lanthanides, displaying unique challenge-response pairs (CRPs) for two-factor authentication. Under laser irradiation in the red spectral region, a speckle pattern is attained and accessed through conventional charge-coupled cameras, and under ultraviolet light-emitting diodes, it displays a luminescent pattern accessed through hyperspectral imaging and converted to a random intensity-based pattern, ensuring the two-factor authentication. This methodology features the use of a discrete cosine transform to enable a low-cost and semi-compact encryption system suited for speckle and luminescence-based CRPs. The PUF evaluation and the authentication protocol required the analysis of multiple CRPs from different tokens, establishing an optimal cryptographic key size (128 bits) and an optimal decision threshold level that minimizes the error probability. (C) 2022 Author(s).
引用
收藏
页数:9
相关论文
共 50 条
  • [1] User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication
    Isler, Devris
    Kupcu, Alptekin
    Coskun, Aykut
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 99 - 117
  • [2] Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
    Jiang, Qi
    Zhang, Xin
    Zhang, Ning
    Tian, Youliang
    Ma, Xindi
    Ma, Jianfeng
    [J]. 2019 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2019,
  • [3] Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols
    Byun, Jin Wook
    Jeong, Ik Rae
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (03) : 1243 - 1252
  • [4] Comments on Physically Unclonable Function Based Two-Factor Authentication Protocols
    Jin Wook Byun
    Ik Rae Jeong
    [J]. Wireless Personal Communications, 2019, 106 : 1243 - 1252
  • [5] The Case for Mobile Two-Factor Authentication
    DeFigueiredo, Dimitri
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 81 - 85
  • [6] On the (In)Security of Mobile Two-Factor Authentication
    Dmitrienko, Alexandra
    Liebchen, Christopher
    Rossow, Christian
    Sadeghi, Ahmad-Reza
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 365 - 383
  • [7] Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Guo, Yunxi
    Tyagi, Akhilesh
    [J]. 2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 512 - 517
  • [8] Implementing Authentication Systems based on Physical Unclonable Functions
    Wallrabenstein, John Ross
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 790 - 796
  • [9] Device Authentication by Physical Unclonable Functions
    Mugali, Kavita Chandrakant
    Patil, Minakshee M.
    [J]. 1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 327 - 329
  • [10] Voice-Based User-Device Physical Unclonable Functions for Mobile Device Authentication
    Yunxi Guo
    Akhilesh Tyagi
    [J]. Journal of Hardware and Systems Security, 2017, 1 (1) : 18 - 37