Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

In this paper, cryptographic architectures based on unequal computing resources are modelled, and experimentally verified with Window-10 PCs powered with Intel I-7 processor. Low power IoT terminal devices generate keys from physical unclonable functions, which can be recognized by the server through a matching engine. We are here proposing methods to modulate the efficiency of the matching engine by injecting erratic bits in the keys, and/or by fragmenting the keys in smaller sub-keys. When the environment is hostile, the difficulty in matching the keys can be adjusted in such a way that the server needs access to increasingly powerful computing power to recognize the terminal device thereby placing attackers with inferior computing power at a strong disadvantage. The objective of this research work is to find, through the modelling effort, the conditions where unequally powered cryptography can take advantage of high performance computers to protect networks of IoT terminals.

Original languageEnglish (US)
Title of host publicationSimulation Series
PublisherThe Society for Modeling and Simulation International
Edition4
ISBN (Electronic)9781510892521, 9781510892538, 9781510892545, 9781510892552, 9781510892569
DOIs
StatePublished - 2019
Event2019 Communications and Networking Simulation, CNS 2019, Part of the 2019 Spring Simulation Multi-Conference, SpringSim 2019 - Tucson, United States
Duration: Apr 29 2019May 2 2019

Publication series

NameSimulation Series
Number4
Volume51
ISSN (Print)0735-9276

Conference

Conference2019 Communications and Networking Simulation, CNS 2019, Part of the 2019 Spring Simulation Multi-Conference, SpringSim 2019
Country/TerritoryUnited States
CityTucson
Period4/29/195/2/19

Keywords

  • IoT security
  • Network security
  • Physical functions

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Unequally powered cryptography with physical unclonable functions for networks of internet of things terminals'. Together they form a unique fingerprint.

Cite this