首页> 外文会议>International Conference on VLSI Design;International Conference on Embedded Systems Design >Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things
【24h】

Tutorial T7: Physically Unclonable Function: A Promising Security Primitive for Internet of Things

机译:教程T7:物理上不可克隆的功能:物联网的有希望的安全性原语

获取原文

摘要

Summary form only given. Internet of Things (IoT) is a network of large number of uniquely identifiable intercommunicating “smart” devices that promise to transform our lives. Lightweight authentication protocols for resource {constrained smart devices should be secure against “physical attacks” such as Side-Channel Attack. Physically Unclonable Functions (PUFs) are a class of novel hardware security primitives that promise a paradigm shift in many security applications and protocols. In essence, a PUF circuit is a partially disordered system that has an instance{speci_c input{output behavior that cannot be replicated by manufacturing (hence physically unclonable"). The unique features of PUFs avoid explicit key storage, and thus make them immune against many of the existing physical attacks which aim to divulge the secret key of cryptographic algorithms. However, the concept of PUF is not a panacea in the domain of security, and they are still vulnerable to several forms of intelligent attacks, using a combination of concepts borrowed from side-channel analysis and machine learning. In this tutorial, we would explore design challenges, operating principles, attacks and defence strategies for PUF circuits. The tutorial would cover the following topics: Fundamentals of PUF, Lightweight PUF Designs, Security Analysis of PUFs and PUF-based Authentication Protocols.
机译:仅提供摘要表格。物联网(IoT)是由众多独特可识别的互通“智能”设备组成的网络,有望改变我们的生活。资源受约束的智能设备的轻量级身份验证协议应该是安全的,以防止“物理攻击”,例如边信道攻击。物理上不可克隆的功能(PUF)是一类新颖的硬件安全原语,它们在许多安全应用程序和协议中有望实现范式转换。本质上,PUF电路是部分无序的系统,其实例{speci_c输入{输出行为无法通过制造来复制(因此物理上不可克隆”)。PUF的独特功能避免了显式密钥存储,从而使其免受免疫许多现有的旨在泄露密码算法秘密密钥的物理攻击,但是,PUF的概念并不是安全领域的灵丹妙药,并且结合使用多种概念,它们仍然容易受到多种形式的智能攻击的攻击借鉴了旁通道分析和机器学习,在本教程中,我们将探讨PUF电路的设计挑战,操作原理,攻击和防御策略,包括以下主题:PUF的基础知识,轻量级PUF设计,安全性分析PUF和基于PUF的身份验证协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号