http://iet.metastore.ingenta.com
1887

P2M-based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices

P2M-based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Computers & Digital Techniques — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Continued growth and development in the consumer electronic market have greatly increased in the realm of home automation. With this swelling in smart, Internet-connected consumer electronics, there is a need to ensure the safe and secure use of these products. So how does one authenticate each product in a large connected environment? How can the authors minimise counterfeiting, cloning, and the presence of Trojans in customer electronics? In this study, they explore their method of using various physically unclonable functions (PUFs) as a potential seed for a pseudorandom number generators (PRNGs) element. These can then be used to authenticate consumer electronic devices or protect communication over a large interconnected network. The advantage of this work is that their method increases the difficulty of attackers to learn patterns of the seed of each PRNG while optimising PUF-based constraints in different consumer electronic domains. Through this work they enhance the function of PRNGs, increasing the difficulty of attackers’ ability to model security systems, as well as present a lightweight and efficient solution to the growing security concerns. By making the PRNG more difficult to model, malicious actors are less able to overcome their proposed security enhancement leading to a safe and secure environment.

http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cdt.2018.5099
Loading

Related content

content/journals/10.1049/iet-cdt.2018.5099
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address