Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering ETDs

2016

Reliability

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Model Building And Security Analysis Of Puf-Based Authentication, Wenjie Che Dec 2016

Model Building And Security Analysis Of Puf-Based Authentication, Wenjie Che

Electrical and Computer Engineering ETDs

In the context of hardware systems, authentication refers to the process of confirming the identity and authenticity of chip, board and system components such as RFID tags, smart cards and remote sensors. The ability of physical unclonable functions (PUF) to provide bitstrings unique to each component can be leveraged as an authentication mechanism to detect tamper, impersonation and substitution of such components. However, authentication requires a strong PUF, i.e., one capable of producing a large, unique set of bits per device, and, unlike secret key generation for encryption, has additional challenges that relate to machine learning attacks, protocol attacks and …