Question: 4 . 1 Authentication Protocol For the above - mentioned scenario, we propose an authentication protocol that consists of two phases, as depicted in Fig.
Authentication Protocol
For the abovementioned scenario, we propose an authentication protocol that
consists of two phases, as depicted in Fig. In the enrollment phase, mea
surements :dots, each corresponding to a memristor cell
from to of a smart device with an identifier are captured and
transmitted to the IoT Hub over a secure channel, eg by establishing a direct
connection between the IoT Hub and the device in a controlled environment
without any other network connection. Each cell is measured with multiple fre
quencies :dots, and amplitudes :dots, The IoT Hub stores
the model Model of the smart device learned by the manufacturer along
with an identifier In the highly unlikely case that the CNN model fails
to be produced for a particular after a few attempts, this shall not
be used. Also, a public key is transmitted to the smart device, which is used in
the next steps of the protocol. There, lightweight algorithms using elliptic curve
cryptography are used.
In the authentication phase, a challengeresponse protocol is executed.
First, the smart device sends a challenge with its identifier to start an
authentication request. Here, describes the concatenation of the message, and
the first italicised segment, eg AuthRequest, is an identifier, allowing the IoT
Hub and the device involved to identify and parse the relevant messages correctly.
The server responds with a challenge containing a device ID a nonce
a cell ID an amplitude and a frequency is used to prevent replay
attacks and can be implemented as a continuous counter or a random number.
The IoT device first checks if the requested device ID is equal to its own,
and then measures the cell by applying the frequency and amplitude to
it resulting in a measurement Afterwards, a message consisting of the
the previously sent nonce and the measurement is encrypted using the previously shared publicKey, and sent to the IoT Hub. Only the IoT
Hub can decrypt the message using its privateKey. The server checks if is
fresh, and chooses the right model, Model based on If the CNN can
classify all measurements correctly using and the IoT device
gets authenticated, otherwise it gets rejected. After a number of unsuccessful
authentication requests for the same the use of that may be disabled. First of have to come up with a secure protocol simplified one this protocol should be like this :
First no neural network in the derived protocol
this protocol should use DRAM PUFs different time different response and temperature
I have to use response for authentication.Helper Data produce relevant key
Use produce key encrypted key for authenticationcan be public key
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
