19,263 Hits in 2.4 sec

Identification and authentication of integrated circuits

Blaise Gassend, Daihyun Lim, Dwaine Clarke, Marten van Dijk, Srinivas Devadas
2004 Concurrency and Computation  
This paper describes a technique to reliably and securely identify individual integrated circuits (ICs) based on the precise measurement of circuit delays and a simple challengeresponse protocol.  ...  We consider potential venues of attack against our system, and present candidate implementations. Experiments on Field Programmable Gate Arrays show that the technique is viable.  ...  For this reason, it is highly desirable for the IDENTIFICATION AND AUTHENTICATION OF INTEGRATED CIRCUITS 15 Figure 6 .  ... 
doi:10.1002/cpe.805 fatcat:zogqsvujufexrntagh6ax7smmy

A technique to build a secret key in integrated circuits for identification and authentication applications

J.W. Lee, Daihyun Lim, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas
2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525)  
Further, the circuit functions reliably over a practical range of environmental variation such as temperature and voltage.  ...  This paper describes a technique that exploits the statistical delay variations of wires and transistors across ICs to build a secret key unique to each IC.  ...  Identification/Authentication Capability Given the interchip variation τ and noise µ, we can estimate the identification/authentication capability of the proposed PUF implementation.  ... 
doi:10.1109/vlsic.2004.1346548 fatcat:ot3pshkvmbdj5geucaurtar6be

Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment

Wei Liang, Weihong Huang, Wuhui Chen, Kuan-Ching Li, Keqin Li
2019 Sensors  
As the major component of hardware devices, the integrated circuit (IC) chip also suffers the threat of illegal, malicious attacks.  ...  To protect against attacks and vulnerabilities of a chip, a credible authentication is of fundamental importance.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19030487 fatcat:idkvf4gppzd2jj63afgmtps2re

A single-chip fingerprint sensor and identifier

S. Shigematsu, H. Morimura, Y. Tanabe, T. Adachi, K. Machida
1999 IEEE Journal of Solid-State Circuits  
The sensor area is 10.1 2 13.5 mm 2 : The sensing and identification time is 102 ms with power consumption of 8.8 mW at 3.3 V.  ...  A chip architecture that integrates a fingerprint sensor and an identifier in a single chip is proposed.  ...  Kyuragi, and T. Wakimoto for their support and comments.  ... 
doi:10.1109/4.808910 fatcat:etazqkmtgreejcspahahtzzjem

Fingerprinting Analog IoT Sensors for Secret-Free Authentication [article]

Felix Lorenz, Lauritz Thamsen, Andreas Wilke, Ilja Behnke, Jens Waldmüller-Littke, Ilya Komarov, Odej Kao, Manfred Paeschke
2020 arXiv   pre-print
While most technology stacks provide means for authentication and encryption of device-to-cloud traffic, there are currently no mechanisms to rule out physical tampering with an IoT device's sensors.  ...  Addressing this gap, we introduce a new method for extracting a hardware fingerprint of an IoT sensor which can be used for secret-free authentication.  ...  In most cases, the circuit is directly integrated with the IoT node or added as a peripheral identification module.  ... 
arXiv:2006.06296v1 fatcat:jheawy7a4za2dit3c3wyapxfmy

AES Algorithm Applied on Security Protocol of RFID

2017 DEStech Transactions on Computer Science and Engineering  
As a consequence, a security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader.  ...  The radio frequency identification (RFID) system may suffer from serious threats that may result in security problems, which becomes a critical issue for RFID systems and applications.  ...  Process of authentication. Figure 6 . 6 Figure 6. AES circuit.  ... 
doi:10.12783/dtcse/cib2015/16150 fatcat:o24ip3b3n5gyfp6ytlbmolpb6e

Design and Fabrication of Identification Inkjet Print Head Chip Fuse Sensors

2016 Sensors and materials  
This paper describes the development of a thermal inkjet print head with an identification circuit. The identification circuit was designed using a fuse and other electronic components.  ...  The multifunctionality of the integrated circuit in a print head of the cartridge was used to satisfy user demands.  ...  The encoding algorithm system belongs to the inkjet system authentication. The identification integrated circuit of the multiplexer inkjet head is composed of a silicon chip.  ... 
doi:10.18494/sam.2016.1305 fatcat:ds7wnzbivnfprlnpzowf33q3m4

Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications

Srinivas Devadas, Edward Suh, Sid Paral, Richard Sowell, Tom Ziola, Vivek Khandelwal
2008 2008 IEEE International Conference on RFID  
We also highlight the advantages of PUF based RFIDs in anti-counterfeiting and security applications.  ...  Physical Unclonable Functions (PUFs) exploit the physical characteristics of the silicon and the IC manufacturing process variations to uniquely characterize each and every silicon chip.  ...  Silicon PUFs derive digital secrets from the complex delay characteristics of wires and transistors in integrated circuits (ICs).  ... 
doi:10.1109/rfid.2008.4519377 fatcat:kcivan3lifanpkh5saelakezli

Physical Unclonable Function (PUF)-Based Sustainable Cybersecurity

Himanshu Thapliyal, Saraju Mohanty
2021 IEEE Consumer Electronics Magazine  
PUFs are a class of circuits that use the inherent variations in the integrated circuit manufacturing process to create unique and unclonable IDs. 1 PUF has the potential to seal multiple types of vulnerabilities  ...  for sustainable cybersecurity specifically in the security classes of authentication, nonrepudiation, and privacy.  ... 
doi:10.1109/mce.2021.3065857 fatcat:3oyojhsnjjbubl3ikqdranvwgm

Key Technology Development and Application of High-Security UHF RFID Systems

Pan Tiejun, Zheng Leina, Wang Ming, Zhu Xiaodong
2016 International Journal of Database Theory and Application  
The reader SoC (system on chip) chip of Ultra high frequency (UHF) Radio Frequency Identification is the key technology to solve these threats.  ...  It solves the critical problem of security and reliability of UHF RFID applications for the national economy, which is of a great significance for the development of China's Internet of Things technology  ...  Acknowledgments International Journal of Database Theory and Application Vol. 9, No.10 (2016)  ... 
doi:10.14257/ijdta.2016.9.10.03 fatcat:4d6ripeuxzhunjjhhoatgvp55q

Implementation Of An Improved Secure System Detection For E-Passport By Using Epc Rfid Tags

A. Baith Mohamed, Ayman Abdel-Hamid, Kareem Youssri Mohamed
2009 Zenodo  
Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure  ...  The GSM network is the main interface between identification center and the e-passport reader.  ...  Data integrity and physical integrity are vital to the security of ID cards as authenticators.  ... 
doi:10.5281/zenodo.1335451 fatcat:cwpgherwunaanbnntrddhdd3bm

RFID System Integration [chapter]

Hamid Jabbar, Taikyeong Ted.
2010 Radio Frequency Identification Fundamentals and Applications Bringing Research to Practice  
Radio Frequency Identification Fundamentals and Applications, Bringing Research to Practice 214 successful identification of tag velocity of movement and change in direction or mobility path also needs  ...  Three genral type of readers are hand-held, mobile nd fixed readers. Reader antenna The selction for antenna mainly depends on weather the business workflow requires integrated or external antenna.  ...  Z 11 is total impedance of reader circuit when the tag circuit is open and Z 22 is impedance of tag circuit when the reader circuit is open.  ... 
doi:10.5772/8000 fatcat:shcgvrov4ndtxnyivivd3qtxli

Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array

Changsheng Wu, Wenbo Ding, Ruiyuan Liu, Jiyu Wang, Aurelia C. Wang, Jie Wang, Shengming Li, Yunlong Zi, Zhong Lin Wang
2018 Materials Today  
Herein, we developed a two-factor, pressure-enhanced keystrokedynamics-based security system that is capable of authenticating and even identifying users through their unique typing behavior.  ...  The rapidly developing human-machine interfacing calls for an effective and continuous authentication solution.  ...  Minister of Science and Technology (2016YFA0202704), National Natural Science Foundation of China (Grant Nos. 51432005, 5151101243, 51561145021).  ... 
doi:10.1016/j.mattod.2018.01.006 fatcat:wdiwdxjk7vf7zaqlpxqvospo5i

Electromagnetic radiation-based IC device identification and verification using deep learning

Hong-xin Zhang, Jia Liu, Jun Xu, Fan Zhang, Xiao-tong Cui, Shao-fei Sun
2020 EURASIP Journal on Wireless Communications and Networking  
In recent years, device identification has been developed and improved as a physical-level technology to improve the security of integrated circuit (IC)-based multifactor authentication systems.  ...  Device identification based on deep residual networks and radio frequency is a technology applicable to the physical layer, which can improve the security of integrated circuit (IC)-based multifactor authentication  ...  Authors' contributions ZH, XJ, and ZF conceived of the study and participated in its design. CX participated in the data collection work. SS participated in the design of the study.  ... 
doi:10.1186/s13638-020-01808-z fatcat:rzlkyj5yqzdofcrbeojeods3he

The Security Analysis of Optical Cable Inspecting System Based on RFID

Li-bin WANG, Da-long GU, Yong SUN, Jing LIU
2017 DEStech Transactions on Computer Science and Engineering  
This article will introduce the relative knowledge of RFID, analysis the overall structure of optical cable inspecting system especially the identification layer, find security problems in the system and  ...  The optical cable inspecting system based on RFID is a kind of technology which use RFID to process data through database and network technology.  ...  In the system of RFID, we often use message authentication code to check data integrity. The message authentication code applies a kind of hash algorithm which has shared key.  ... 
doi:10.12783/dtcse/smce2017/12434 fatcat:yta27xxsaze4zpo6sppnmefolu
« Previous Showing results 1 — 15 out of 19,263 results