An authentication strategy based on spatiotemporal chaos for software copyright protection

L Cao, Y Lou, J Bi, S Qiu, Z Lu, Jim Harkin, Liam McDaid

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].
LanguageEnglish
Pages4073-4086
JournalSecurity and Communication Networks
Volume8
Issue number18
Publication statusPublished - 1 Dec 2015

Fingerprint

Chaos theory
Authentication
Embedded systems
Field programmable gate arrays (FPGA)
Experiments

Keywords

  • Authentication strategy
  • copyright protection
  • FPGA hardware
  • security performance

Cite this

@article{6bc6372c8a7c4e8d801376fd69bb8e86,
title = "An authentication strategy based on spatiotemporal chaos for software copyright protection",
abstract = "An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].",
keywords = "Authentication strategy, copyright protection, FPGA hardware, security performance",
author = "L Cao and Y Lou and J Bi and S Qiu and Z Lu and Jim Harkin and Liam McDaid",
year = "2015",
month = "12",
day = "1",
language = "English",
volume = "8",
pages = "4073--4086",
journal = "Security and Communication Networks",
issn = "1939-0114",
number = "18",

}

An authentication strategy based on spatiotemporal chaos for software copyright protection. / Cao, L; Lou, Y; Bi, J; Qiu, S; Lu, Z; Harkin, Jim; McDaid, Liam.

In: Security and Communication Networks, Vol. 8, No. 18, 01.12.2015, p. 4073-4086.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An authentication strategy based on spatiotemporal chaos for software copyright protection

AU - Cao, L

AU - Lou, Y

AU - Bi, J

AU - Qiu, S

AU - Lu, Z

AU - Harkin, Jim

AU - McDaid, Liam

PY - 2015/12/1

Y1 - 2015/12/1

N2 - An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].

AB - An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].

KW - Authentication strategy

KW - copyright protection

KW - FPGA hardware

KW - security performance

M3 - Article

VL - 8

SP - 4073

EP - 4086

JO - Security and Communication Networks

T2 - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 18

ER -