IoT 보안을 위한 디바이스 DNA 개념 |
Choi, Dooho
(한국전자통신연구원 지능보안연구그룹)
Kang, Yousung (한국전자통신연구원 지능보안연구그룹) Oh, Mi-Kyung (한국전자통신연구원 지능보안연구그룹) Lee, Sangjae (한국전자통신연구원 지능보안연구그룹) Kim, Taesung (한국전자통신연구원 지능보안연구그룹) |
1 | J. R. Wallrabenstein, "Practical and Secure IoT Device Authentication Using Physical Unclonable Funtions", In IEEE 4th International Conference on Future Internet of Things and Cloud, 2016 |
2 | C. Javli et.al. "Demo abstract; Location fingerprint evidence and authorisation using WiFi channel characteristics", In IEEE PerCom Workshops, 2016 |
3 | J. Huang and T. Jiang, "Secret key generation exploiting Ultra-wideband indoor wireless channel characteristics", In Security and Communication Networks, vol.8, no.13, pp 2329-2337, Sept. 2015 DOI |
4 | W. Xiong et.al. "Run-time Accessible DRAM PUFs in Commodity Devices", In CHES 2016, LNCS 9813, pp 432-453, 2016 |
5 | Y. Cao et.al. "CMOS Image Sensor Based Physical Unclonable Function for Coherent Sensor-Level Authentication", In IEEE Transactions on Cricuits and Systems I, vol.62, no.11, pp. 262902640, 2015 |
6 | C, Huth et.al. "Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things", In IEEE Access, vo.5, pp. 11909-11926, Jun. 2017 DOI |
7 | G. Simmons, "A system for verifying user identity and authorization at the point of sale or access", Cryptologia, vol. 8, no. 1, pp. 1-21, 1984. DOI |
8 | D. Lim, J. Lee, B. Gassend, G. Suh, M. van Dijk, and S. Devadas, "Extracting secret keys from integrated circuits", IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 10, pp. 1200-1205, 2005. DOI |
9 | A Maiti, J. Casarona, L. McHale, and P. Schaumont, "A large scale characterization of RO-PUF", In HOST 2010, Proceedings of IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 94-99, June 2010. |
10 | Z. Cherif, J. Danger, S. Guilley, and L. Bossuet, "An Easy-to-Design PUF based on a single oscillator: the Loop PUF", In DSD 2012, Proceedings of Euromicro Conference on Digital System Design, September 2012. |
11 | T.W. Kim, B.D. Choi, and D.K. Kim, "Zero biterror rate ID generation circuit using via formation probability in 0.18 CMOS process", In Electronics Letters, vol. 50, no. 12, pp. 876-877, 2014. DOI |
12 | D. Holcomb, W. Burleson, and K. Fu, "Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers", IEEE Trans. Computers, vol. 58, no. 9, pp. 1198-1210, September 2009. DOI |
13 | W. Xiong, A. Schaller, N. Anagnostopoulos, M. Saleem, S. Gabmeyer. S. Katzenbeisser, and J. Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices", In CHES 2016, Proceedings of Conference on Cryptographic Hardware and Embedded Systems, pp. 432-453, Santa Barbara, August 2016. |
14 | I, Kumari, M. Oh, and D. Choi, "Rapid Run-time DRAM PUF based on Bit-Flip Position for Secure IoT Devices", To appear Proceeding of IEEE Sensors 2018 |
15 | A.K. Jain, R. Bolle, and S. Pankanti, "Biometrics: Personal Identification in Networked Society", Kluwer Academic Publications, ISBN 978-0-7923-8345-1, 1999 |