Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

In this paper, cryptographic architectures based on unequal computing resources are modelled, and experimentally verified with Window-10 PCs powered with Intel I-7 processor. Low power IoT terminal devices generate keys from physical unclonable functions, which can be recognized by the server through a matching engine. We are here proposing methods to modulate the efficiency of the matching engine by injecting erratic bits in the keys, and/or by fragmenting the keys in smaller sub-keys. When the environment is hostile, the difficulty in matching the keys can be adjusted in such a way that the server needs access to increasingly powerful computing power to recognize the terminal device thereby placing attackers with inferior computing power at a strong disadvantage. The objective of this research work is to find, through the modelling effort, the conditions where unequally powered cryptography can take advantage of high performance computers to protect networks of IoT terminals.

Original languageEnglish (US)
Title of host publication2019 Spring Simulation Conference, SpringSim 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781510883888
DOIs
StatePublished - Apr 2019
Event2019 Spring Simulation Conference, SpringSim 2019 - Tucson, United States
Duration: Apr 29 2019May 2 2019

Publication series

Name2019 Spring Simulation Conference, SpringSim 2019

Conference

Conference2019 Spring Simulation Conference, SpringSim 2019
Country/TerritoryUnited States
CityTucson
Period4/29/195/2/19

Keywords

  • IoT security
  • Network security
  • Physical functions

ASJC Scopus subject areas

  • Control and Optimization
  • Control and Systems Engineering
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals'. Together they form a unique fingerprint.

Cite this