Browse > Article

IoT 보안을 위한 디바이스 DNA 개념  

Choi, Dooho (한국전자통신연구원 지능보안연구그룹)
Kang, Yousung (한국전자통신연구원 지능보안연구그룹)
Oh, Mi-Kyung (한국전자통신연구원 지능보안연구그룹)
Lee, Sangjae (한국전자통신연구원 지능보안연구그룹)
Kim, Taesung (한국전자통신연구원 지능보안연구그룹)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. R. Wallrabenstein, "Practical and Secure IoT Device Authentication Using Physical Unclonable Funtions", In IEEE 4th International Conference on Future Internet of Things and Cloud, 2016
2 C. Javli et.al. "Demo abstract; Location fingerprint evidence and authorisation using WiFi channel characteristics", In IEEE PerCom Workshops, 2016
3 J. Huang and T. Jiang, "Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics", In Security and Communication Networks, vol.8, no.13, pp 2329-2337, Sept. 2015   DOI
4 W. Xiong et.al. "Run-time Accessible DRAM PUFs in Commodity Devices", In CHES 2016, LNCS 9813, pp 432-453, 2016
5 Y. Cao et.al. "CMOS Image Sensor Based Physical Unclonable Function for Coherent Sensor-Level Authentication", In IEEE Transactions on Cricuits and Systems I, vol.62, no.11, pp. 262902640, 2015
6 C, Huth et.al. "Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things", In IEEE Access, vo.5, pp. 11909-11926, Jun. 2017   DOI
7 G. Simmons, "A system for verifying user identity and authorization at the point of sale or access", Cryptologia, vol. 8, no. 1, pp. 1-21, 1984.   DOI
8 D. Lim, J. Lee, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, pp. 1200-1205, 2005.   DOI
9 A Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF", In HOST 2010, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 94-99, June 2010.
10 Z. Cherif, J. Danger, S. Guilley, and L. Bossuet, "An Easy-to-Design PUF based on a single oscillator: the Loop PUF", In DSD 2012, Proceedings of Euromicro Conference on Digital System Design, September 2012.
11 T.W. Kim, B.D. Choi, and D.K. Kim, "Zero biterror rate ID generation circuit using via formation probability in 0.18 ${\mu}m$ CMOS process", In Electronics Letters, vol. 50, no. 12, pp. 876-877, 2014.   DOI
12 D. Holcomb, W. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers", IEEE Trans. Computers, vol. 58, no. 9, pp. 1198-1210, September 2009.   DOI
13 W. Xiong, A. Schaller, N. Anagnostopoulos, M. Saleem, S. Gabmeyer. S. Katzenbeisser, and J. Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices", In CHES 2016, Proceedings of Conference on Cryptographic Hardware and Embedded Systems, pp. 432-453, Santa Barbara, August 2016.
14 I, Kumari, M. Oh, and D. Choi, "Rapid Run-time DRAM PUF based on Bit-Flip Position for Secure IoT Devices", To appear Proceeding of IEEE Sensors 2018
15 A.K. Jain, R. Bolle, and S. Pankanti, "Biometrics: Personal Identification in Networked Society", Kluwer Academic Publications, ISBN 978-0-7923-8345-1, 1999