TY - JOUR
T1 - Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions
AU - Guajardo, J.
AU - Skoric, B.
AU - Tuyls, P.T.
AU - Kumar, S.S.
AU - Bel, T.
AU - Blom, A.H.M.
AU - Schrijen, G.J.
PY - 2009
Y1 - 2009
N2 - Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and radio frequency identification systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices.
AB - Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and radio frequency identification systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices.
U2 - 10.1007/s10796-008-9142-z
DO - 10.1007/s10796-008-9142-z
M3 - Article
SN - 1387-3326
VL - 11
SP - 19
EP - 41
JO - Information Systems Frontiers
JF - Information Systems Frontiers
IS - 1
ER -