Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies?
Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies?
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we envisage a combined mutual authentication and key establishment scheme to shed light on their synergy.
68 - 75
Zhang, Junqing
96a6f2ea-949c-4bf2-bf5e-d665c3ad50ea
Chang, Chip-Hong
ac29711b-f252-4cd3-8848-c015eef3433e
Gu, Chongyan
b7e94e7b-58f6-426f-b429-e44717a50a40
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
1 November 2022
Zhang, Junqing
96a6f2ea-949c-4bf2-bf5e-d665c3ad50ea
Chang, Chip-Hong
ac29711b-f252-4cd3-8848-c015eef3433e
Gu, Chongyan
b7e94e7b-58f6-426f-b429-e44717a50a40
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Zhang, Junqing, Chang, Chip-Hong, Gu, Chongyan and Hanzo, Lajos
(2022)
Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies?
IEEE Network, 36 (6), .
(doi:10.1109/MNET.107.2100372).
Abstract
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we envisage a combined mutual authentication and key establishment scheme to shed light on their synergy.
Text
manuscript
- Accepted Manuscript
More information
Accepted/In Press date: 4 May 2022
e-pub ahead of print date: 25 July 2022
Published date: 1 November 2022
Identifiers
Local EPrints ID: 457321
URI: http://eprints.soton.ac.uk/id/eprint/457321
ISSN: 0890-8044
PURE UUID: f9100a88-45cd-495d-80af-4a0e4c6ce6eb
Catalogue record
Date deposited: 01 Jun 2022 16:37
Last modified: 21 Sep 2024 04:01
Export record
Altmetrics
Contributors
Author:
Junqing Zhang
Author:
Chip-Hong Chang
Author:
Chongyan Gu
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics