Lightweight authentication equipment and an authentication method based on a feedback loop PUF

A lightweight authentication and feedback loop technology, applied in the field of PUF authentication, can solve problems such as the infeasibility of large-scale edge devices, and achieve the effect of improving flexibility and low cost

Active Publication Date: 2019-04-12
HOHAI UNIV CHANGZHOU
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these methods provide secure authentication at the hardware level, they are not feasible for large-scale edge devices because they require secure servers to store huge stimulus-response pairs (CRP)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight authentication equipment and an authentication method based on a feedback loop PUF
  • Lightweight authentication equipment and an authentication method based on a feedback loop PUF
  • Lightweight authentication equipment and an authentication method based on a feedback loop PUF

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0071] The lightweight authentication device based on the feedback loop PUF in the embodiment of the present invention has a circuit structure as figure 1 As shown, N takes 64, M takes 2, and K takes 4, which includes a 64-bit linear feedback shift register module (64-bit LFSR), a 64-bit arbiter PUF module (64-bit Arbiter PUF), and a 2-bit counter module (2-bit Counter), eFuse-based feedback network module and output D flip-flop module, in which the 64-bit linear feedback shift register module (64-bit LFSR) contains 4 XOR gates.

[0072] 64-bit linear feedback shift register module, including a 2-to-1 data selector MUX, 64 D flip-flops (the 0th, 1st...63rd D flip-flops from right to left) and 4 XOR gates (Denoted as xor_1, xor_2, xor_3, xor_4). The two input terminals of the 2-to-1 data selector are respectively connected to the input signal (Serial_in) and the output terminal of the XOR gate xor_1, the selection control terminal is connected to the control signal Mode, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses lightweight authentication equipment based on a feedback loop PUF. The lightweight authentication equipment comprises an N-bit linear feedback shift register, an N-bit arbiterPUF module, an M-bit counter module, an eFuse-based feedback network module and an output D trigger module, Under the control of the clock period CLK, every time one clock period is passed, the N-bitlinear feedback shift register module outputs a new value, and the N-bit arbiter PUF module outputs a new response; and under the control of the clock 2 ^ M frequency division signal CLK _ 2 ^ M, a certain response of the N-bit arbiter PUF module is used as the final output Out of the output D trigger module. Authentication method based on device does not need to store a large number of excitations. According to the response pair, the flexibility on the existing machine learning attack is improved, and the advantages of low cost and high security are attractive to resource-limited equipment inan edge network.

Description

technical field [0001] The invention relates to the technical field of PUF authentication, in particular to a lightweight authentication device and an authentication method based on a feedback loop PUF. Background technique [0002] Fog computing is the extension of cloud computing to the edge of the network, characterized by a decentralized architecture. Fog computing covers a wide range of new applications such as real-time data processing, smart healthcare. [0003] Authentication is an essential security protocol in fog computing because it enhances mutual trust between devices in fog networks. In the prior art, efforts have been made to develop feasible low-cost authentication schemes to deal with resource-constrained edge devices. For example, lightweight symmetric-key encryption algorithms such as SPINS, TinySec, and LEAP+ are proposed and implemented in distributed sensor networks with small computational requirements. However, key management and communication ove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44H04L9/32
CPCG06F21/44H04L9/3278
Inventor 曹元韩丽娟
Owner HOHAI UNIV CHANGZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products