Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
نویسندگان
چکیده
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices.
منابع مشابه
Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
Physical Unclonable Functions (PUFs) are physical structures that are hard to clone and have a unique challenge-response behaviour. The term PUF was coined by Pappu et al. in 2001. That work triggered a lot of interest, and since then a substantial number of papers has been written about the use of a wide variety of physical structures for different security purposes such as identification, aut...
متن کاملReflective-Physically Unclonable Function based System for Anti-Counterfeiting
Product security techniques, in particular those targeting counterfeit goods, are under increased focus due to proliferation of supply and distribution chains across the world. Counterfeit goods are not restricted to specific product categories but pose problems across the board. In addition to loss of revenue, the usefulness of the product, functionality and safety are undermined by counterfei...
متن کاملPhysical Unclonable Functions and Secure Processors
As computing devices become ever more pervasive, two contradictory trends are appearing. On one hand computing elements are becoming small, disseminated and unsupervised. On the other hand, the cost of security breaches is increasing as we place more responsibility on the devices that surround us. The result of these trends is that physical attacks present an increasing risk that must be dealt ...
متن کاملSecurity Analysis of Image-Based PUFs for Anti-counterfeiting
Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet, as with any security system, it is important to embed them in a sound protocol, ensuring that no unexpected weakness is present in the mortar binding the components together. This paper proposes an anti-counterfeiting protocol that provably reduces to natural properties of its underlying compone...
متن کاملAnti-Counterfeiting technique based Reflective-Physically Unclonable Functions
Reflective Physically Unclonable Functions (r-PUFs) are a manifestation of a security principle where two dimensional projections of randomly distributed reflective microstructures in a three dimensional plane form the basis of an anticounterfeiting technique. In this paper we present an overview of the system design with focus on optical aspects of the technique along with summary results.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Systems Frontiers
دوره 11 شماره
صفحات -
تاریخ انتشار 2009