2019
DOI: 10.1109/access.2019.2925106
|View full text |Cite
|
Sign up to set email alerts
|

PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment

Abstract: With rapid advances in edge computing and the Internet of Things, the security of low-layer hardware devices attract more and more attention. As an ideal hardware solution, field programmable gate array (FPGA) becomes a mainstream technology to design a complex system. The designed modules are named as intellectual property (IP) cores. In this paper, we consider both misappropriation of hardware devices and software IPs in edge computing and propose a PUF-based IP copyright anonymous authentication scheme. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The PUF uniqueness measures the ability to produce a unique key for different PUF instances with the same challenge at the same environmental conditions. To evaluate the PUF uniqueness U, the average inter-chip Hamming Distance (HDinter) of the output responses from m different PUF instances is calculated by (1) [47].…”
Section: A Uniquenessmentioning
confidence: 99%
“…The PUF uniqueness measures the ability to produce a unique key for different PUF instances with the same challenge at the same environmental conditions. To evaluate the PUF uniqueness U, the average inter-chip Hamming Distance (HDinter) of the output responses from m different PUF instances is calculated by (1) [47].…”
Section: A Uniquenessmentioning
confidence: 99%
“…In another study, Gope et al, [14], [15] proposed the PUF-based authentication protocol for realtime data access in industrial wireless sensor networks. The authentication scheme for field-programmable gate array (FPGA) application is proposed in [16]. The proposed technique eliminates the requirement of the enormous CRPs database in the verifier by using the double PUF authentication model.…”
Section: Related Workmentioning
confidence: 99%
“…With the increasing popularity of cloud computing and virtualization technology [11][12][13][14][15][16], a large number of servers are connected to switches through high-speed links. erefore, the data center carries a huge amount of data and an efficient flow scheduling strategy is needed to achieve load balancing of current network flow, improve link utilization, and reduce link congestion [17].…”
Section: Data Center Networkmentioning
confidence: 99%