An authentication strategy based on spatiotemporal chaos for software copyright protection

L Cao, Y Lou, J Bi, S Qiu, Z Lu, Jim Harkin, Liam McDaid

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].
Original languageEnglish
Pages (from-to)4073-4086
JournalSecurity and Communication Networks
Volume8
Issue number18
Publication statusPublished (in print/issue) - 1 Dec 2015

Keywords

  • Authentication strategy
  • copyright protection
  • FPGA hardware
  • security performance

Fingerprint

Dive into the research topics of 'An authentication strategy based on spatiotemporal chaos for software copyright protection'. Together they form a unique fingerprint.

Cite this