Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

نویسندگان

  • Jorge Guajardo
  • Boris Skoric
  • Pim Tuyls
  • Sandeep S. Kumar
  • Thijs Bel
  • Antoon H. M. Blom
  • Geert Jan Schrijen
چکیده

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets

Physical Unclonable Functions (PUFs) are physical structures that are hard to clone and have a unique challenge-response behaviour. The term PUF was coined by Pappu et al. in 2001. That work triggered a lot of interest, and since then a substantial number of papers has been written about the use of a wide variety of physical structures for different security purposes such as identification, aut...

متن کامل

Reflective-Physically Unclonable Function based System for Anti-Counterfeiting

Product security techniques, in particular those targeting counterfeit goods, are under increased focus due to proliferation of supply and distribution chains across the world. Counterfeit goods are not restricted to specific product categories but pose problems across the board. In addition to loss of revenue, the usefulness of the product, functionality and safety are undermined by counterfei...

متن کامل

Physical Unclonable Functions and Secure Processors

As computing devices become ever more pervasive, two contradictory trends are appearing. On one hand computing elements are becoming small, disseminated and unsupervised. On the other hand, the cost of security breaches is increasing as we place more responsibility on the devices that surround us. The result of these trends is that physical attacks present an increasing risk that must be dealt ...

متن کامل

Security Analysis of Image-Based PUFs for Anti-counterfeiting

Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet, as with any security system, it is important to embed them in a sound protocol, ensuring that no unexpected weakness is present in the mortar binding the components together. This paper proposes an anti-counterfeiting protocol that provably reduces to natural properties of its underlying compone...

متن کامل

Anti-Counterfeiting technique based Reflective-Physically Unclonable Functions

Reflective Physically Unclonable Functions (r-PUFs) are a manifestation of a security principle where two dimensional projections of randomly distributed reflective microstructures in a three dimensional plane form the basis of an anticounterfeiting technique. In this paper we present an overview of the system design with focus on optical aspects of the technique along with summary results.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information Systems Frontiers

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2009