DocumentCode
2210296
Title
Security fusion based on state machine compositions
Author
Al Ibrahim, Omar ; Nair, Suku
Author_Institution
SMU HACNet Labs., Southern Methodist Univ., Dallas, TX, USA
fYear
2011
fDate
11-15 April 2011
Firstpage
39
Lastpage
46
Abstract
Security fusion is a new paradigm in security for resource-constrained environments. Following this paradigm, strong system-level security is achieved by combining weak primitives from multiple nodes. In this paper, we describe a fusion methodology based on state machine compositions. From the properties of compositions, we devise a challenge-response system that composes low-entropy state machines at individual nodes into one with higher entropy. We use built-in digital logic such as Physical Unclonable Functions (PUFs) to efficiently mass generate and distribute keys. In addition, we draw on the properties of compositions to reduce the key storage complexity at the infrastructure-level, with high coverage and early detectability at the system-level.
Keywords
finite state machines; security of data; key storage complexity; low-entropy state machines; physical unclonable functions; resource-constrained environments; security fusion; state machine compositions; Complexity theory; Computer architecture; Cryptography; Integrated circuit interconnections; Integrated circuit modeling; Sensors;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on
Conference_Location
Paris
Print_ISBN
978-1-4244-9905-2
Type
conf
DOI
10.1109/CICYBS.2011.5949402
Filename
5949402
Link To Document