The University of Southampton
University of Southampton Institutional Repository

Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies?

Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies?
Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies?
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we envisage a combined mutual authentication and key establishment scheme to shed light on their synergy.
0890-8044
Zhang, Junqing
96a6f2ea-949c-4bf2-bf5e-d665c3ad50ea
Chang, Chip-Hong
ac29711b-f252-4cd3-8848-c015eef3433e
Gu, Chongyan
b7e94e7b-58f6-426f-b429-e44717a50a40
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Zhang, Junqing
96a6f2ea-949c-4bf2-bf5e-d665c3ad50ea
Chang, Chip-Hong
ac29711b-f252-4cd3-8848-c015eef3433e
Gu, Chongyan
b7e94e7b-58f6-426f-b429-e44717a50a40
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1

Zhang, Junqing, Chang, Chip-Hong, Gu, Chongyan and Hanzo, Lajos (2022) Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors or allies? IEEE Network. (In Press)

Record type: Article

Abstract

Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we envisage a combined mutual authentication and key establishment scheme to shed light on their synergy.

Text
manuscript - Accepted Manuscript
Restricted to Repository staff only until 4 May 2024.
Request a copy

More information

Accepted/In Press date: 4 May 2022

Identifiers

Local EPrints ID: 457321
URI: http://eprints.soton.ac.uk/id/eprint/457321
ISSN: 0890-8044
PURE UUID: f9100a88-45cd-495d-80af-4a0e4c6ce6eb
ORCID for Lajos Hanzo: ORCID iD orcid.org/0000-0002-2636-5214

Catalogue record

Date deposited: 01 Jun 2022 16:37
Last modified: 17 Mar 2024 02:35

Export record

Contributors

Author: Junqing Zhang
Author: Chip-Hong Chang
Author: Chongyan Gu
Author: Lajos Hanzo ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×