Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

J. Guajardo, B. Skoric, P.T. Tuyls, S.S. Kumar, T. Bel, A.H.M. Blom, G.J. Schrijen

Onderzoeksoutput: Bijdrage aan tijdschriftTijdschriftartikelAcademicpeer review

59 Citaten (Scopus)

Samenvatting

Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and radio frequency identification systems based on the use of Physical Unclonable Functions (PUFs). In addition, to providing an overview of different existing PUF realizations, we introduce a PUF realization aimed at ultra-low cost applications. We then show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. Our protocols are more efficient (round complexity) and allow for lower costs compared to previously proposed ones. We also provide an overview of PUF applications aimed at solving the counterfeiting of goods and devices.
Originele taal-2Engels
Pagina's (van-tot)19-41
TijdschriftInformation Systems Frontiers
Volume11
Nummer van het tijdschrift1
DOI's
StatusGepubliceerd - 2009

Vingerafdruk

Duik in de onderzoeksthema's van 'Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions'. Samen vormen ze een unieke vingerafdruk.

Citeer dit