Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding

被引:39
作者
Perazzone, Jake Bailey [1 ]
Yu, Paul L. [3 ]
Sadler, Brian M. [3 ]
Blum, Rick S. [2 ]
机构
[1] Lehigh Univ, Bethlehem, PA 18015 USA
[2] Lehigh Univ, Elect & Comp Engn Dept, Bethlehem, PA 18015 USA
[3] US Army, Res Lab, Adelphi, MD 20783 USA
基金
美国国家科学基金会;
关键词
Authentication; fingerprint embedding; side-channel signaling; physical layer security; PHYSICAL-LAYER; PROBABILITY;
D O I
10.1109/TIFS.2018.2812202
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication via fingerprint embedding at the physical layer utilizes noise in the wireless channel to attain a certain degree of information theoretic security that traditional HMAC methods cannot provide. Fingerprint embedding refers to a key-aided process of superimposing a low-power tag to the primary message waveform for the purpose of authenticating the transmission. The tag is uniquely created from the message and key and successful authentication is achieved when the correct tag is detected by the receiver. This paper generalizes a framework for embedding physical layer fingerprints to create an authenticated side-channel for minimal cost. Side-channel information is conveyed to the receiver through the transmitter's choice of tag from a secret codebook generated by the primary message and a shared secret key. In addition, a new linear coding scheme is introduced which enhances the ability to trade off the performance goals of authentication, side-channel rate, secrecy, and privacy.
引用
收藏
页码:2216 / 2225
页数:10
相关论文
共 43 条
[21]   Electromagnetic Side-Channel Hardware Trojan Detection Based on Transfer Learning [J].
Sun, Shaofei ;
Zhang, Hongxin ;
Cui, Xiaotong ;
Dong, Liang ;
Fang, Xing .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) :1742-1746
[22]   Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study [J].
Javeed, Arsalan ;
Yilmaz, Cemal ;
Savas, Erkay .
IEEE ACCESS, 2023, 11 :48945-48976
[23]   Machine Learning for PIN Side-Channel Attacks Based on Smartphone Motion Sensors [J].
Nerini, Matteo ;
Favarelli, Elia ;
Chiani, Marco .
IEEE ACCESS, 2023, 11 :23008-23018
[24]   Hybrid Side-Channel/Machine-Learning Attacks on PUFs: A New Threat? [J].
Xu, Xiaolin ;
Burleson, Wayne .
2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
[25]   Side-Channel Analysis Against SecOC-Compliant AES-CMAC [J].
Ebina, Katsumi ;
Ueno, Rei ;
Homma, Naofumi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (10) :3772-3776
[26]   A Novel Method for Physical-Layer Authentication via Channel State Information [J].
Lord, Scott ;
Roth, John ;
McEachen, John ;
Tummala, Murali .
2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,
[27]   Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks [J].
Kroeger, Trevor ;
Cheng, Wei ;
Guilley, Sylvain ;
Danger, Jean-Luc ;
Karimi, Nazhmeh .
PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, :1000-1005
[28]   A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks [J].
Hsieh, Tsung-Che ;
Tseng, Yuh-Min ;
Huang, Sen-Shan .
IEEE ACCESS, 2020, 8 :121795-121810
[29]   A Multipole Approach Toward On-Chip Metal Routing for Reduced EM Side-Channel Leakage [J].
Nath, Mayukh ;
Das, Debayan ;
Sen, Shreyas .
IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2021, 31 (06) :685-688
[30]   Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags [J].
Plos, Thomas .
TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 :444-458