Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/108905
Citations | ||
Scopus | Web of ScienceĀ® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gao, Y. | - |
dc.contributor.author | Li, G. | - |
dc.contributor.author | Ma, H. | - |
dc.contributor.author | Al-Sarawi, S.F. | - |
dc.contributor.author | Kavehei, O. | - |
dc.contributor.author | Abbott, D. | - |
dc.contributor.author | Ranasinghe, D.C. | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Pervasive Computing and Communication Workshops (PerCom Workshops), 2016 IEEE International Conference on, 2016, pp.1-6 | - |
dc.identifier.isbn | 9781509019410 | - |
dc.identifier.uri | http://hdl.handle.net/2440/108905 | - |
dc.description.abstract | Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are increasingly becoming part of the fabric of life. Using these pervasive devices to store and collect data securely is becoming a challenge because stringent requirements on power and area constrain the implementation of standard cryptographic mechanisms. In this paper, we propose a secure and lightweight authentication protocol for resource scarce pervasive devices built upon a physical unclonable function (PUF) primitive termed Obfuscated PUF (OB-PUF) and a variant of a parameter-based authentication protocol. This protocol sends obfuscated challenges to an OB-PUF where the subsequent recovery of the obfuscated challenges by a server (verifier) is guaranteed. In particular, our approach exploits server (verifer) aided computations to reduce the hardware complexity on the pervasive device while still maintaining a high level of security and taking advantage of the known vulnerability of PUFs to model building attacks. Most importantly, the unclonability of the OB-PUF is preserved and, consequently, OB-PUF based pervasive devices are resilient to cloning. We also show through statistical analysis and model building attacks the infeasibility of constructing a model of our proposed OB-PUF by an adversary. | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.source.uri | http://dx.doi.org/10.1109/percomw.2016.7457162 | - |
dc.title | Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices | - |
dc.type | Conference paper | - |
dc.contributor.conference | 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops (14 Mar 2016 - 19 Mar 2016 : IEEE) | - |
dc.identifier.doi | 10.1109/PERCOMW.2016.7457162 | - |
dc.publisher.place | Online | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Al-Sarawi, S.F. [0000-0002-3242-8197] | - |
dc.identifier.orcid | Abbott, D. [0000-0002-0945-2674] | - |
dc.identifier.orcid | Ranasinghe, D.C. [0000-0002-2008-9255] | - |
Appears in Collections: | Aurora harvest 8 Electrical and Electronic Engineering publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RA_hdl_108905.pdf Restricted Access | Restricted Access | 177.14 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.