Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

4 . 1 Authentication Protocol For the above - mentioned scenario, we propose an authentication protocol that consists of two phases, as depicted in Fig.

4.1 Authentication Protocol
For the above-mentioned scenario, we propose an authentication protocol that
consists of two phases, as depicted in Fig. 8. In the enrollment phase, mea-
surements MDID:={MC0,dots,MCn}, each corresponding to a memristor cell
from C0 to Cn of a smart device with an identifier DID, are captured and
transmitted to the IoT Hub over a secure channel, e.g. by establishing a direct
connection between the IoT Hub and the device in a controlled environment
without any other network connection. Each cell is measured with multiple fre-
quencies F:={f0,dots,fn} and amplitudes A:={a0,dots,an}. The IoT Hub stores
the model Model ?DID of the smart device learned by the manufacturer along
with an identifier DID. In the highly unlikely case that the CNN model fails
to be produced for a particular DID after a few attempts, this DID shall not
be used. Also, a public key is transmitted to the smart device, which is used in
the next steps of the protocol. There, lightweight algorithms using elliptic curve
cryptography are used.
In the authentication phase, a challenge-response protocol is executed.
First, the smart device sends a challenge with its identifier DID to start an
authentication request. Here, || describes the concatenation of the message, and
the first italicised segment, e.g., AuthRequest, is an identifier, allowing the IoT
Hub and the device involved to identify and parse the relevant messages correctly.
The server responds with a challenge containing a device ID DID', a nonce N,
a cell ID CID, an amplitude a, and a frequency f.N is used to prevent replay
attacks and can be implemented as a continuous counter or a random number.
The IoT device first checks if the requested device ID,DID', is equal to its own,
and then measures the cell CID by applying the frequency f and amplitude a to
it, resulting in a measurement MCID. Afterwards, a message consisting of the
DID, the previously sent nonce N, and the measurement MCID is encrypted using the previously shared publicKey, and sent to the IoT Hub. Only the IoT
Hub can decrypt the message using its privateKey. The server checks if N is
fresh, and chooses the right model, Model ?DID, based on DID. If the CNN can
classify all measurements correctly using ModelDID,a, and f, the IoT device
gets authenticated, otherwise it gets rejected. After a number of unsuccessful
authentication requests for the same DID, the use of that DID may be disabled. First of have to come up with a secure protocol (simplified one) this protocol should be like this :
-First no neural network in the derived protocol
-this protocol should use DRAM PUFs (different time different response and temperature)
- I have to use response for authentication.Helper Data produce relevant key
- Use produce key encrypted key for authentication(can be public key)
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions