Font Size: a A A

Research On Security Authentication Technology Based On IoT Hardware Circuit Protection

Posted on:2020-12-01Degree:MasterType:Thesis
Country:ChinaCandidate:S Y XieFull Text:PDF
GTID:2428330620454830Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of semiconductor integrated circuit(IC)technology,more and more IoT IC electronic products have entered people's lives.The circuit modules of these electronic products are usually protected by copyright information by circuit watermarking technology.However,due to the process manufacturing cost of IC equipment and related technologies,IC circuit products often face many security problems,such as being vulnerable to illegal attacks such as cloning,counterfeiting and side channels.At present,in the field of IC integrated circuit security protection,the hash function is mainly used to perform a series of encryption processing on the circuit module information,but the hash function is too expensive to manufacture and is difficult to realize in the circuit module of the low-cost IC device.The main work of this paper is as follows:(1)Aiming at the security problem of the current physical unclonable functions(PUF)security protocol technology,this paper first proposes an RFID-PUF two-way identity authentication protocol based on scrambling matching model.This protocol designs a new incentive information generation and string encryption mechanism.The two-way authentication of the radio frequency identification(RFID)system is realized by embedding the PUF structure in the tag and deploying the MPUF model in the reader.The protocol in this paper solves the problem of high cost of RFID system in the process of identity authentication.The simulation and performance comparison results show that this protocol has better security performance,and the calculation cost and storage cost of this protocol are relatively low.It also reduces the security certification cost of the RFID system to a large extent.(2)Aiming at the various security vulnerabilities between IoT devices,this paper proposes an IoT device identity authentication protocol based on PUF collaborative structure.This protocol constructs a PUF security authentication model based on the incentive response behavior of PUF.The model designs two PUF structures on the IoT device side: SRAM PUF and arbiter PUF.The two PUF circuit structures can complement each other to complete the protocol authentication access task.In addition,the AVISPA simulation tool is used to implement the two-way authentication process of gateway(GW)and devices(Dev)of this protocol.The complete certification process for IoT devices from registration to access to other devices was designed and analyzed.The design of this protocol greatly reduces the computational cost and storage cost of IoT equipment.The simulation results and performance analysis showed that the validity of the proposed protocol is well proved.As a new IC chip hardware security protection technology,IC hardware circuit identity authentication technology cannot only be used for copyright protection of IC hardware circuits.It can also be widely used in security applications such as key generation and identity authentication.
Keywords/Search Tags:Integrated circuit, RFID, Internet of things, PUF, Hardware security
PDF Full Text Request
Related items