TY - GEN
T1 - Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals
AU - Cambou, Bertrand
N1 - Publisher Copyright:
© 2019 SCS.
PY - 2019/4
Y1 - 2019/4
N2 - In this paper, cryptographic architectures based on unequal computing resources are modelled, and experimentally verified with Window-10 PCs powered with Intel I-7 processor. Low power IoT terminal devices generate keys from physical unclonable functions, which can be recognized by the server through a matching engine. We are here proposing methods to modulate the efficiency of the matching engine by injecting erratic bits in the keys, and/or by fragmenting the keys in smaller sub-keys. When the environment is hostile, the difficulty in matching the keys can be adjusted in such a way that the server needs access to increasingly powerful computing power to recognize the terminal device thereby placing attackers with inferior computing power at a strong disadvantage. The objective of this research work is to find, through the modelling effort, the conditions where unequally powered cryptography can take advantage of high performance computers to protect networks of IoT terminals.
AB - In this paper, cryptographic architectures based on unequal computing resources are modelled, and experimentally verified with Window-10 PCs powered with Intel I-7 processor. Low power IoT terminal devices generate keys from physical unclonable functions, which can be recognized by the server through a matching engine. We are here proposing methods to modulate the efficiency of the matching engine by injecting erratic bits in the keys, and/or by fragmenting the keys in smaller sub-keys. When the environment is hostile, the difficulty in matching the keys can be adjusted in such a way that the server needs access to increasingly powerful computing power to recognize the terminal device thereby placing attackers with inferior computing power at a strong disadvantage. The objective of this research work is to find, through the modelling effort, the conditions where unequally powered cryptography can take advantage of high performance computers to protect networks of IoT terminals.
KW - IoT security
KW - Network security
KW - Physical functions
UR - http://www.scopus.com/inward/record.url?scp=85068600177&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85068600177&partnerID=8YFLogxK
U2 - 10.23919/SpringSim.2019.8732853
DO - 10.23919/SpringSim.2019.8732853
M3 - Conference contribution
AN - SCOPUS:85068600177
T3 - 2019 Spring Simulation Conference, SpringSim 2019
BT - 2019 Spring Simulation Conference, SpringSim 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 Spring Simulation Conference, SpringSim 2019
Y2 - 29 April 2019 through 2 May 2019
ER -