Towards Robust Low Cost Authentication for Pervasive Devices

被引:60
|
作者
Oeztuerk, Erdinc [1 ]
Hammouri, Ghaith [1 ]
Sunar, Berk [1 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
关键词
D O I
10.1109/PERCOM.2008.54
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footprint limitations of such networks, prevent us from employing standard cryptographic techniques for authentication which were originally designed to secure high end systems with abundant power. Furthermore, the sharp increase in the number, diversity and strength of physical attacks which directly target the implementation may have devastating consequences in a network setting creating a single point of failure. A compromised node may leak a master key, or may give the attacker an opportunity for injecting faulty messages. In this paper we present a lightweight challenge response authentication scheme based on noisy physical unclonable functions (PUF) that allows for extremely efficient implementations. Furthermore, the inherent properties of PUFs provide cryptographically strong tamper resilience. In a network setting this means that a tampered device will no longer authenticate and in a sense will be isolated from the network.
引用
收藏
页码:170 / 178
页数:9
相关论文
共 50 条
  • [1] HBC entity authentication for low-cost pervasive devices
    Li, Z.
    Gong, G.
    [J]. IET INFORMATION SECURITY, 2012, 6 (03) : 212 - 218
  • [2] Unilateral Authentication on Low-cost Devices
    Clupek, Vlastimil
    Zeman, Vaclav
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 88 - 92
  • [3] Towards Pervasive Mashups in Embedded Devices
    Mikkonen, Tommi
    Salminen, Arto
    [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA 2010), 2010, : 35 - 42
  • [4] A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications
    al Mahmod, Md Jubayer
    Guin, Ujjwal
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 20
  • [5] Low Cost Robust Inter-Server Authentication for Cloud Environments
    Daffu, Preeti
    Kaur, Amanpreet
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 537 - 541
  • [6] Robust Mutual Authentication and Secure Transmission of Information on Low-cost Devices Using Physical Unclonable Functions and Hash Functions
    Clupek, Vlastimil
    Zeman, Vaclav
    [J]. 2016 39TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2016, : 100 - 103
  • [7] Vascular Pattern Analysis towards Pervasive Palm Vein Authentication
    Bhattacharyya, Debnath
    Das, Poulami
    Kim, Tai-hoon
    Bandyopadhyay, Samir Kumar
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (05) : 1081 - 1089
  • [8] Techniques for low cost authentication and message authentication
    Gilbert, H
    [J]. SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 183 - 192
  • [9] A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
    Catuogno, Luigi
    Galdi, Clemente
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 16 - +
  • [10] Pervasive Internet-Wide Low-Latency Authentication
    Kraehenbuehl, Cyrill
    Legner, Markus
    Bitterli, Silvan
    Perrig, Adrian
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,