A novel RF fingerprinting approach for hardware integrated security
نویسندگان
چکیده
A novel approach for RF fingerprinting using a simple microwave passive device is proposed. This device is a multi-port cavity resonator filled with a dielectric material mixed with randomly-distributed microor nano-particles. Such structure generates a typical Physical Unclonable Function (PUF) that can be perfectly used for storing and protecting secure information. This mixture guarantees a spatial random distortion on the electromagnetic fields and consequently a unique fingerprint. The extraction of these fingerprints is based on the scattered near-fields which are represented by the S-parameters. Preliminary measurement results show a high degree of reliability and reproducibility of the fingerprints over the UWB frequency range. a 2014 Elsevier Ltd. All rights reserved.
منابع مشابه
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
rticle history: eceived 30 November 2012 eceived in revised form 30 April 2013 ccepted 14 June 2013 vailable online xxxx eywords: adio fingerprinting mpersonation attack hysical layer security ardware security Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fing...
متن کاملSecurity of Wireless Devices using Biological-Inspired RF Fingerprinting Technique
Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless devices. RF fingerprinting classification is performed by selecting an “unknown” signal from the pool, generating its RF fingerprint, and using a classifier to correlate the recei...
متن کاملHardware Trojan Detection in Analog/RF Integrated Circuits
Globalization of semiconductor manufacturing has brought about increasing concerns regarding possible infiltration of the Integrated Circuit (IC) supply chain by skilled and resourceful adversaries, with the intention of introducing malicious modifications (a.k.a hardware Trojans) which can be exploited to cause incorrect results, steal sensitive data, or even incapacitate a chip. While numerou...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملSplit Manufacturing in Radio-Frequency Designs
With the globalization of integrated circuit (IC) design flow and the outsourcing of chip fabrication service, intellectual property (IP) piracy and malicious logic insertion become main security threats to tamper hardware infrastructures. While most of the protection methods are dedicated for digital circuits, we try to protect radio-frequency (RF) designs which are more likely to be IP piracy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sec. Appl.
دوره 19 شماره
صفحات -
تاریخ انتشار 2014