2019
DOI: 10.3390/s19030487
|View full text |Cite
|
Sign up to set email alerts
|

Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment

Abstract: Rapid advances in the Internet-of-Things (IoT) have exposed the underlying hardware devices to security threats. As the major component of hardware devices, the integrated circuit (IC) chip also suffers the threat of illegal, malicious attacks. To protect against attacks and vulnerabilities of a chip, a credible authentication is of fundamental importance. In this paper, we propose a Hausdorff distance-based method to authenticate the identity of IC chips in IoT environments, where the structure is analyzed, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…With the secret-sharing mechanism presented in section 3, any k groups of sequence can restore the original copyright information. The matrix B, B can be calculated by solving the equation set in (10).…”
Section: Algorithm 3 Trading Information Verification Algorithmmentioning
confidence: 99%
“…With the secret-sharing mechanism presented in section 3, any k groups of sequence can restore the original copyright information. The matrix B, B can be calculated by solving the equation set in (10).…”
Section: Algorithm 3 Trading Information Verification Algorithmmentioning
confidence: 99%
“…The digital image watermarking technique grows very rapidly in recent years, which attracts wide attention of various research institutes and colleges all over the world. American Scientific working group for image technology has proposed the optimal operation specifications to analyse photograph pictures, video, integrated circuit chip and video/image specifically for the judiciary authority and some crime forensics departments (Liang et al, 2015(Liang et al, , 2019. The splicing or tampering on a digital image may leave some traces, which can be detected as an evidence to prove the tampering attack.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, some mathematical theories of ECC 19 , 20 are introduced as the foundation of the proposed algorithm. At the elliptic curve, we select two points K and G. Based on the characteristic of ECC group, we have K = kG.…”
Section: Preliminariesmentioning
confidence: 99%