Please use this identifier to cite or link to this item:
Title: Securing IoT monitoring device using PUF and physical layer authentication
Authors: Zheng, Yue
Dhabu, Sumedh Somnath
Chang, Chip Hong
Keywords: Physical Unclonable Functions
Physical Layer Authentication
DRNTU::Engineering::Electrical and electronic engineering
Issue Date: 2018
Source: Zheng, Y., Dhabu, S. S., & Chang, C. H. (2018). Securing IoT monitoring device using PUF and physical layer authentication. 2018 IEEE International Symposium on Circuits and Systems (ISCAS). doi:10.1109/ISCAS.2018.8351844
Conference: 2018 IEEE International Symposium on Circuits and Systems (ISCAS)
Abstract: IoT is rapidly becoming a reality. Forecasts predict more than 20 billion connected devices in 2020. These devices bring many benefits, but securing them in IoT environment can be a quandary. With the advent of technology, it is very easy for an adversary to clone a device and replace it, or tamper the data. In the context of wireless communications in IoT, the definition of message authentication should be extended to include verification of the device along with the integrity of the message it produced. In this paper we propose a device- and data-dependent physical layer authentication scheme by using a device-specific, dynamically variable key to generate a data-dependent tag. This tag is embedded in the data transmission using an information hiding scheme to reliably extract it at the receiver, and without compromising the performance of the underlying wireless communication system. Simulation results show that our scheme can achieve high authentication rate while rejecting the tampered transmissions in typical noisy communication channel.
DOI: 10.1109/ISCAS.2018.8351844
Schools: School of Electrical and Electronic Engineering 
Rights: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [].
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:EEE Conference Papers

Files in This Item:
File Description SizeFormat 
iscas_ss_nov21_final_1045am.pdf1.05 MBAdobe PDFThumbnail

Citations 20

Updated on Apr 8, 2024

Web of ScienceTM
Citations 50

Updated on Oct 24, 2023

Page view(s) 50

Updated on Apr 21, 2024

Download(s) 20

Updated on Apr 21, 2024

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.