SecuCode: Intrinsic PUF Entangled <u>Secu</u>re Wireless <u>Code</u> Dissemination for Computational RFID Devices

نویسندگان

چکیده

The simplicity of deployment and perpetual operation energy harvesting devices provides a compelling proposition for new class edge the Internet Things. In particular, Computational Radio Frequency Identification (CRFID) are an emerging battery-free, computational, sensing enhanced that harvest all their operation. Despite wireless connectivity powering, secure firmware updates remains open challenge CRFID due to: intermittent limited computational capabilities, absence supervisory operating system. We present, first time, code dissemination (SecuCode) mechanism CRFIDs by entangling device intrinsic hardware security primitive Static Random Access Memory Physical Unclonable Function (SRAM PUF) to update protocol. design SecuCode: i) overcomes resource-constrained intermittently powered nature devices; ii) is fully compatible with existing communication protocols employed in ISO-18000-6C protocol; built upon standard industry compliant compilation method realized extending recent framework provided Texas Instruments. build end-to-end SecuCode implementation conduct extensive experiments demonstrate standards compliance, evaluate performance security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Puf-enabled Rfid Tags in Electronic Banking

Radio Frequency Identification (RFID) tags have a variety of applications in e-banking. For effective utilization of the technology, this should be reinforced toward security holes and attacks. One of the common attacks on RFID systems is RFID tags cloning. In this paper we review cloning attacks in ebanking. We propose solutions based on physical unclonable functions (PUF) and provide a suitab...

متن کامل

Emerging Issues in Wireless Computational Grids for Mobile Devices

An important factor influencing task execution time is the mobility of the devices. Higher mobility is a critical factor affecting the grid performance. In other words, if the devices in the grid are highly mobile, this adversely impacts the time taken to perform a computationally-intensive task. A related issue is that of subordinates and/or the initiator leaving the cell while partial tasks a...

متن کامل

PUF-Based Software Protection for Low-End Embedded Devices

In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable targets for software piracy and software manipulation. Aggravating this situation, low-end embedded devices typically lack secure hardware to effectively protect against such attacks. In th...

متن کامل

PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage is being adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various attacks. This paper surveys RFID systems, ci...

متن کامل

Security Analysis of a PUF based RFID Authentication Protocol

In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. [2]. The designers have claimed that their protocol offers immunity against a broad range of attacks while it provides excellent performance. However, we prove in contrary to its designers claim, this protocol does not provide any security. We present an efficient...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2021

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2019.2934438