2018 14th International Wireless Communications &Amp; Mobile Computing Conference (IWCMC) 2018
DOI: 10.1109/iwcmc.2018.8450341
|View full text |Cite
|
Sign up to set email alerts
|

A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

Abstract: Some of the main challenges towards utilizing conventional cryptographic techniques in Internet of Things (IoT) include the need for generating secret keys for such a large-scale network, distributing the generated keys to all the devices, key storage as well as the vulnerability to security attacks when an adversary gets physical access to the devices. In this paper, a novel secret key generation method is proposed for IoTs that utilize the intrinsic randomness embedded in the devices' memories introduced in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Korenda, Ashwija Reddy Et al. [20] The fuzzy extractor discussed in this paper ensures much less mutual information between the generated keys and the helper data. The experimental results show that their discussed scheme is capable of generating notably stronger keys compared to existing techniques, while utilizing a significantly lower number of helper data bits.…”
Section: Related Workmentioning
confidence: 99%
“…Korenda, Ashwija Reddy Et al. [20] The fuzzy extractor discussed in this paper ensures much less mutual information between the generated keys and the helper data. The experimental results show that their discussed scheme is capable of generating notably stronger keys compared to existing techniques, while utilizing a significantly lower number of helper data bits.…”
Section: Related Workmentioning
confidence: 99%
“…This work utilized polar codes for extraction of key and helper data, thus utilizing the property of zero mutual information between the helper and key. In our previous work, we utilized serially concatenated polar and BCH codes to generate 250 bit keys with 262 helper data bits using SC decoder and Belief propagation decoders, while maintaining a comparable failure probability of 10 −8 and 10 −10 , respectively [36].…”
Section: Fuzzy Extractorsmentioning
confidence: 99%
“…Key Length Helper Data bits Failure Probability Flipping probability Reed Muller Generalized Multiple Concatenated coding [32] 128 13952 10 −6 15% BCH Repetition Code [33] 128 2052 10 −9 13% Generalized Concatenated (GC) Reed Muller [34] 2048 2048 5.37.10 −10 14% GC Reed Solomon [34] 1024 1024 3.47.10 −10 14% Polar Codes SC [35] 128 896 10 −6 15% HA SCL Polar Codes [35] 128 896 10 −9 15% Serially Concatenated BCH and Polar codes using SC decoder [36] 250 262 10 −8 15% Serially Concatenated BCH and Polar codes using Belief Propagation decoder [36] 250 262 10 −10 15% Fig. 7.…”
Section: Fuzzy Extractor Constructionmentioning
confidence: 99%
See 2 more Smart Citations