Akademska digitalna zbirka SLovenije - logo
E-viri
Celotno besedilo
  • Anitha, Komma; Kumar Gopathoti, Kiran; Rajeswari, J; Majji, Sankararao; Radhika Patnala, Tulasi; Sri Sai Satyanarayana, Damaraju

    2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2021-Dec.-2
    Conference Proceeding

    It is critical in today's security-conscious environments and communications to create unique identities, and this can be done with software or hardware. Hardware can create a reliable and unique identity with less complexity than software because software requires more complex algorithms to keep the secret hidden from the adversaries. PUF is the name of one such basic circuit. Even when made using a nominally identical process, no two physical objects are exactly the same. When presented with a binary input, a PUF circuit responds with a binary, device-unique output. A PUF circuit is designed to be sensitive to manufacturing process variations. PUF as a hardware primitive is used as an authentication device in the real-world practical application scheme. The proposed IoT node-to-node mutual authentication algorithm does not require a server or a trusted third party. FPGA boards are used to implement the algorithm's main modules, such as the Nonce generation logic and the unclonable response generation logic. In spite of identity theft, PUF-based authentication schemes have the assurance that malicious parties cannot replace the intended PUF-based node.