Reflective-Physically Unclonable Function based System for Anti-Counterfeiting

نویسنده

  • Harsha Umesh Babu
چکیده

Product security techniques, in particular those targeting counterfeit goods, are under increased focus due to proliferation of supply and distribution chains across the world. Counterfeit goods are not restricted to specific product categories but pose problems across the board. In addition to loss of revenue, the usefulness of the product, functionality and safety are undermined by counterfeit products. A security technique that can be harmoniously applied across product categories as an anti-counterfeiting measure is explored in this dissertation. Physically unclonable functions (PUFs) are physical security mechanisms, which utilize inherent randomness in processes used to instantiate physical objects. In this dissertation, an extensive overview of both, the state of the art in implementations and the accompanying literature dealing with definition and analysis is provided. Although this is a relatively new domain, one can find established methods and metrics that can be applied in analysis of PUFs. We review these, while presenting our priorities in the framework of anti-counterfeiting application. Focus on experimental verification of unclonability, is a marked difference in our approach when compared with other implementations and analyses in this domain. The concept of the reflective physically unclonable function (r-PUF) is presented as a product security solution. The viability of the concept, while evaluating and defining the requirements of such a system is explored. The evolution process of the system design is elaborated, which allows for understanding of the compromises that were reached. The anti-counterfeiting system is a combination of physical modules –instantiation, registration, verification and software modules –data extraction, algorithms for processing the data and application layers to provide functionality. During the dissertation, end-to-end functionality of an anti-counterfeiting system using r-PUF was verified. The system variables in the r-PUF instantiation process were identified and their influence in the system was studied. Experiments were designed to understand the impact of individual variables and results were analysed. We were able to conclusively prove the unclonability of r-PUFs in an anti-counterfeiting scenario.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-Counterfeiting technique based Reflective-Physically Unclonable Functions

Reflective Physically Unclonable Functions (r-PUFs) are a manifestation of a security principle where two dimensional projections of randomly distributed reflective microstructures in a three dimensional plane form the basis of an anticounterfeiting technique. In this paper we present an overview of the system design with focus on optical aspects of the technique along with summary results.

متن کامل

Security Analysis of Image-Based PUFs for Anti-counterfeiting

Physically Unclonable Functions are a promising tool to protect against counterfeiting attacks. Yet, as with any security system, it is important to embed them in a sound protocol, ensuring that no unexpected weakness is present in the mortar binding the components together. This paper proposes an anti-counterfeiting protocol that provably reduces to natural properties of its underlying compone...

متن کامل

Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs

This paper presents a lightweight anti-counterfeiting solution using intrinsic Physically Unclonable Functions (PUFs), which are already embedded in most commodity hardware platforms. The presented solution is particularly suitable for low-end computing devices without on-board security features. Our anti-counterfeiting approach is based on extracting a unique fingerprint for individual devices...

متن کامل

FPGA Based Physically Unclonable Functions and Neural Networks for Preventing Counterfeiting Problems

Anti-counterfeiting technology/methods have entered a new era with the implementation of critical designs and confidential information transfer protocols. Manufacturing, assembly, and testing are now moving globally outside the company’s facility to be done at contract manufacturers making the security of the critical design and information a top priority. According to the AntiCounterfeiting Bu...

متن کامل

RFID-Tags for Anti-counterfeiting

RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. This chip functionality makes it possible to verify the authenticity of a product and hence to detect and prevent counterfeiting. In order to be successful for these security purposes too, RFID-tags have to be resista...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013