期刊文献+

基于PUF的智能家居安全认证协议

PUF-based Smart Home Security Authentication Protocol
下载PDF
导出
摘要 为了解决智能家居系统中隐私泄露、网络攻击和设备漏洞等安全问题,本文提出了一种基于物理不可克隆函数(Physical Unclonable Function, PUF)的智能家居安全认证协议。该系统利用PUF输出具有唯一性的特点,构建硬件辅助身份认证协议,提高了智能家居系统的安全性和可靠性。本文还在Xilinx Zynq-7000开发板和服务器端对该安全认证协议进行了验证和分析。最终结果表明,本文提出的基于PUF的智能家居安全认证协议具有更高的可靠性,能够有效增强智能家居系统的安全性。 In order to solve security problems such as privacy leakage,network attacks and device vulnerabilities in smart home systems,this paper proposes a smart home security authentication protocol based on Physical Unclonable Function(PUF).It takes advantage of the uniqueness of PUF output to build a hardware-assisted authentication protocol,which improves the security and reliability of the smart home system.This paper also verifies and analyzes this security authentication system protocol on Xilinx Zynq-7000 development board and server side.The final results show that the PUF-based smart home security authentication protocol proposed in this paper has higher reliability and can effectively enhance the security of the smart home system.
作者 安扬 An Yang(CITIC General Institute of Architectural Design and Research Co.,Ltd.,Wuhan 430010,China)
出处 《智能建筑电气技术》 2023年第5期119-124,共6页 Electrical Technology of Intelligent Buildings
关键词 PUF 身份认证协议 智能家居 安全性 PUF authentication protocol smart home security
  • 相关文献

参考文献10

二级参考文献78

  • 1刘笑楠,张文云,高艳娜.局部置乱结合双随机相位编码的双虹膜身份模板保护方法[J].仪器仪表学报,2020(6):233-239. 被引量:5
  • 2黄承夏,杨林,马琳茹,李京鹏.基于组件技术的网络安全管理架构研究[J].信息安全与通信保密,2006,28(6):61-63. 被引量:9
  • 3Halderman J A,Schoen S D,Heninger N,et al. Lest we remember :cold-boot attacks on encryption keys [ J]. Communication of theACM, 2009,52(5) :91-98. 被引量:1
  • 4Smart phone thefts rise Henyu [ R/OL]. (2014-03-28). http://www. consumerreports. org/ cro/ news/2014/04/smart-phone-thefts-rose-to- 3-1 -million-last-year/index. htm. 被引量:1
  • 5翟方庆.极限破解:利用低温环境读取Android加密数据[EB/0L]. ( 2013-02-19 ) . http://www. csdn. net/article/1970- 01 - 01/2814179. 被引量:1
  • 6成明遥.渗透测试中的冷却启动攻击和其他取证技术[EB/OL].(2014- 01- 11 ). http://blog. idf. cn/2014/01 /using-cold-boot-at-tacks-and-other-forensic-techniques-in-penetration-tests/. 被引量:1
  • 7Scheick L Z,Guertin S M,Swift G M. Analysis of radiation effects onindividual DRAM cells [ J ]. IEEE Trans on Nuclear Science,2000,47(6): 2534-2538. 被引量:1
  • 8Gutmann P. Data remanence in semiconductor devices [ C ] //Proc ofthe 10th USENIX Security Symposium. 2001:1-19. 被引量:1
  • 9Gruhn M, Mtiller T. On the practicability of cold boot attacks[ C]//Proc of the 8th International Conference on Availability, Reliabilityand Security. 2013 ; 390-397. 被引量:1
  • 10Link W, May H. Eigenschaften von MOS-Ein-Transistorspeicherzellenbei tiefen Temperaturen [ J ]. Archivfur Elektronik Ubertragung-stechnik, 1979,33: 229-235. 被引量:1

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部