Answered step by step
Verified Expert Solution
Question
1 Approved Answer
4 . 1 Authentication Protocol For the above - mentioned scenario, we propose an authentication protocol that consists of two phases, as depicted in Fig.
Authentication Protocol For the abovementioned scenario, we propose an authentication protocol that consists of two phases, as depicted in Fig. In the enrollment phase, mea surements :dots, each corresponding to a memristor cell from to of a smart device with an identifier are captured and transmitted to the IoT Hub over a secure channel, eg by establishing a direct connection between the IoT Hub and the device in a controlled environment without any other network connection. Each cell is measured with multiple fre quencies :dots, and amplitudes :dots, The IoT Hub stores the model Model of the smart device learned by the manufacturer along with an identifier In the highly unlikely case that the CNN model fails to be produced for a particular after a few attempts, this shall not be used. Also, a public key is transmitted to the smart device, which is used in the next steps of the protocol. There, lightweight algorithms using elliptic curve cryptography are used. In the authentication phase, a challengeresponse protocol is executed. First, the smart device sends a challenge with its identifier to start an authentication request. Here, describes the concatenation of the message, and the first italicised segment, eg AuthRequest, is an identifier, allowing the IoT Hub and the device involved to identify and parse the relevant messages correctly. The server responds with a challenge containing a device ID a nonce a cell ID an amplitude and a frequency is used to prevent replay attacks and can be implemented as a continuous counter or a random number. The IoT device first checks if the requested device ID is equal to its own, and then measures the cell by applying the frequency and amplitude to it resulting in a measurement Afterwards, a message consisting of the the previously sent nonce and the measurement is encrypted using the previously shared publicKey, and sent to the IoT Hub. Only the IoT Hub can decrypt the message using its privateKey. The server checks if is fresh, and chooses the right model, Model based on If the CNN can classify all measurements correctly using and the IoT device gets authenticated, otherwise it gets rejected. After a number of unsuccessful authentication requests for the same the use of that may be disabled. First of have to come up with a secure protocol simplified one this protocol should be like this : First no neural network in the derived protocol this protocol should use DRAM PUFs different time different response and temperature I have to use response for authentication.Helper Data produce relevant key Use produce key encrypted key for authenticationcan be public key
Authentication Protocol
For the abovementioned scenario, we propose an authentication protocol that
consists of two phases, as depicted in Fig. In the enrollment phase, mea
surements :dots, each corresponding to a memristor cell
from to of a smart device with an identifier are captured and
transmitted to the IoT Hub over a secure channel, eg by establishing a direct
connection between the IoT Hub and the device in a controlled environment
without any other network connection. Each cell is measured with multiple fre
quencies :dots, and amplitudes :dots, The IoT Hub stores
the model Model of the smart device learned by the manufacturer along
with an identifier In the highly unlikely case that the CNN model fails
to be produced for a particular after a few attempts, this shall not
be used. Also, a public key is transmitted to the smart device, which is used in
the next steps of the protocol. There, lightweight algorithms using elliptic curve
cryptography are used.
In the authentication phase, a challengeresponse protocol is executed.
First, the smart device sends a challenge with its identifier to start an
authentication request. Here, describes the concatenation of the message, and
the first italicised segment, eg AuthRequest, is an identifier, allowing the IoT
Hub and the device involved to identify and parse the relevant messages correctly.
The server responds with a challenge containing a device ID a nonce
a cell ID an amplitude and a frequency is used to prevent replay
attacks and can be implemented as a continuous counter or a random number.
The IoT device first checks if the requested device ID is equal to its own,
and then measures the cell by applying the frequency and amplitude to
it resulting in a measurement Afterwards, a message consisting of the
the previously sent nonce and the measurement is encrypted using the previously shared publicKey, and sent to the IoT Hub. Only the IoT
Hub can decrypt the message using its privateKey. The server checks if is
fresh, and chooses the right model, Model based on If the CNN can
classify all measurements correctly using and the IoT device
gets authenticated, otherwise it gets rejected. After a number of unsuccessful
authentication requests for the same the use of that may be disabled. First of have to come up with a secure protocol simplified one this protocol should be like this :
First no neural network in the derived protocol
this protocol should use DRAM PUFs different time different response and temperature
I have to use response for authentication.Helper Data produce relevant key
Use produce key encrypted key for authenticationcan be public key
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started