32 research outputs found
Distance Bounding based on PUF
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study of the DB protocol of Kleber et al. based on Physical Unclonable Functions (PUFs). We contradict the claim that it resists to Terrorist Fraud (TF). We propose some slight modifications to increase the security of the protocol and formally prove TF-resistance, as well as resistance to Distance Fraud (DF), and Man-In-the-Middle attacks (MiM) which include relay attacks
Physical key-protected one-time pad
We describe an encrypted communication principle that forms a secure link between two parties without
electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique
mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of
patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of
unique 2 mm^3 scattering objects. This shared randomness is used to facilitate information-theoretically
secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage
over electronic memory include the inability to probe, duplicate or selectively reset any bits without
fundamentally altering the entire key space. Our ability to securely couple the randomness contained within
two unique physical objects can extend to strengthen hardware required by a variety of cryptographic
protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile
communication culture
Dependability of Aggregated Objects, a pervasive integrity checking architecture
International audienceRFID-enabled security solutions are becoming ubiquitous; for example in access control and tracking applications. Well known solutions typically use one tag per physical object architecture to track or control, and a central database of these objects. This architecture often requires a communication infrastructure between RFID readers and the database information system. Aggregated objects is a different approach presented in this paper, where a group of physical objects use a set of RFID tags to implement a self-contained security solution. This distributed approach offers original advantages, in particular autonomous operation without an infrastructure support, and enhanced security
A CURRENT TO DIGITAL CONVERTER FOR POWER SIGNATURE GENERATION APPLICATIONS
The security of IoT devices is significantly increasing as a consequence of the widespread usage of the Internet of Things (IoT) in applications that include confidential data and implementation of important control decisions using those data. Because of their cheap cost and computational limitations, IoT devices confront significant obstacles in safeguarding. Among the variety of devised tactics analyzing power is one of the most potential strategies to address such challenges. However, due to the size, cost, and power consumption of power analysis devices, this strategy is not suited for many IoT applications. In this thesis, two techniques for collecting power signatures were proposed. A commercial 130nm CMOS technology is used to construct two circuits for each technique. For the purpose of determining how correctly the setups function, a considerable number of simulations are run under various conditions, and the results are assessed