2015 IEEE Trustcom/BigDataSE/I​SPA
Download PDF

Abstract

We consider a complete implementation of an authentication system based on physical unclonable functions (PUFs), which eliminate the need to store private keys in non-volatile memory. However, strong PUF-based authentication protocols require computationally expensive cryptographic primitives, complicating deployment on resource-constrained hardware. We demonstrate that our strong PUF-based authentication system is capable of being deployed on resource-constrained hardware using a protocol extension that reduces the computational burden on the PUF-enabled device. We then experimentally evaluate the performance of our protocols for enrollment and authentication on a resource-constrained device.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles