• 제목/요약/키워드: Physically unclonable functions

검색결과 6건 처리시간 0.018초

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Hidar, Tarik;Abou el kalam, Anas;Benhadou, Siham;Kherchttou, Yassine
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.15-22
    • /
    • 2022
  • The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.

다중 공정변수를 활용한 저비용 PUF 보안 Chip의 제작 (Fabrication of Low-Cost Physically Unclonable Function (PUF) Chip Using Multiple Process Variables)

  • 지홍석;손돌;연주원;길태현;박효준;윤의철;이문권;박준영
    • 한국전기전자재료학회논문지
    • /
    • 제37권5호
    • /
    • pp.527-532
    • /
    • 2024
  • Physically Unclonable Functions (PUFs) provide a high level of security for private keys using unique physical characteristics of hardware. However, fabricating PUF chips requires numerous semiconductor processes, leading to high costs, which limits their applications. In this work, we introduce a low-cost manufacturing method for PUF security chips. First, surface roughening through wet-etching is utilized to create random variables. Additionally, physical vapor deposition is added to further enhance randomness. After PUF chip fabrication, both Hamming distance (HD) and Hamming weight (HW) are extracted and compared to verify the fabricated chip. It is confirmed that the PUF chip using two different multiple process variables demonstrates superior uniqueness and uniformity compared to the PUF security chip fabricated using only a single process variable.

물리적 복제 불가능 회로 정량적 특성 평가 방법 연구 (A Study of Quantitative Characterization of Physically Uncloanble Functions)

  • 김문석
    • 융합보안논문지
    • /
    • 제23권5호
    • /
    • pp.143-150
    • /
    • 2023
  • 하드웨어를 이용한 보안 프로토콜 구현 및 사용에 있어 물리적 복제 불가능 회로 연구가 증가하고 있다. 물리적 복제 불가능 회로는 집적 회로 및 보안 시스템의 인증, 복제 방지. 중요 정보 저장 등의 기능 수행이 가능하다. 물리적 복제 불가능 회로의 구현을 통해 기밀성, 무결성, 가용성 보안 기능 중 많은 보안 기능의 적용이 가능한 솔루션이다. 따라서, 물리적 복제 불가능 회로는 안전한 반도체 집적 회로 및 보안 시스템 구현에 중요한 기반 기술로 주목받고 있다. 하지만, 물리적 복제 불가능회로가 보안 기능을 갖기 위해서는 예측 불가능성, 특이성, 견고성 특성을 가져야 한다, 이 연구에서는 물리적 복제 불가능 회로의 특성 방법에 관하여 자세히 설명하고 소개한다. 이 연구 결과를 적용하여 구현한 물리적 복제 불가능 회로의 정량적 특성 평가가 가능하고 보안 시스템의 적용 가능성을 평가할 수 있다.

e-Cryptex: 물리적으로 복제 불가능한 기능을 활용한 역공학 방지 기법 (e-Cryptex: Anti-Tampering Technology using Physically Unclonable Functions)

  • 최지원;박선용;이중희;이형규;이규호;장우현;최준호
    • 한국산업정보학회논문지
    • /
    • 제29권3호
    • /
    • pp.23-40
    • /
    • 2024
  • 하드웨어 공격은 암호화 키 혹은 회로 설계와 같은 민감한 정보를 훔치기 위해 물리적인 역공학 작업을 수반한다. 암호화와 난독화는 대표적인 대응책이지만, 공격자가 키를 알아내면 무력화된다. 이 문제를 해결하기 위해 본 연구에서는 물리적으로 복제할 수 없는 기능 (Physically Unclonable Function)을 위변조 방지 방패로 활용하는 e-Cryptex를 제안한다. PUF는 난수 생성기 역할을 하며 복제나 복원할 수 없는 고유한 물리적 변형을 사용해 변조 방지 메커니즘을 강화한다. e-Cryptex는 시스템 구조를 보호하고 키를 생성하기 위해 PUF를 실드로 사용한다. 실드를 변조하면 키가 파괴된다. 본 논문은 e-Cryptex가 PUF 보안 요구 사항을 충족하며 실드를 뚫거나 완전히 파괴하는 변조 시도를 탐지하는 데 효과적임을 입증한다. 각 보드는 정상적인 조건에서 일관되게 같은 키를 생성하는 동시에 여러 보드에서 키 고유성을 보여준다.

마이크로그리드에서 장치들을 위한 하이브리드 블록 체인 기반 식별 관리 프레임워크 (A Hybrid Blockchain-based Identity Management Framework for Devices in Microgrid)

  • 레진 카바카스;나인호
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2019년도 춘계종합학술대회
    • /
    • pp.7-8
    • /
    • 2019
  • This paper presents a hybrid blockchain-based Identity Management Framework for devices in Microgrid. It incorporates the use of a Public and Private Blockchain platform to store and authenticate Microgrid device identities. It also emphasizes the shared responsibility of the manufacturers to provide the first layer of authentication for the devices they produce. Identities of each device are stored in the private and public Blockchain and authenticated using physically unclonable functions (PUF) and cryptographic functions.

  • PDF

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.