Abstract
Language | English |
---|---|
Pages | 4073-4086 |
Journal | Security and Communication Networks |
Volume | 8 |
Issue number | 18 |
Publication status | Published - 1 Dec 2015 |
Fingerprint
Keywords
- Authentication strategy
- copyright protection
- FPGA hardware
- security performance
Cite this
}
An authentication strategy based on spatiotemporal chaos for software copyright protection. / Cao, L; Lou, Y; Bi, J; Qiu, S; Lu, Z; Harkin, Jim; McDaid, Liam.
In: Security and Communication Networks, Vol. 8, No. 18, 01.12.2015, p. 4073-4086.Research output: Contribution to journal › Article
TY - JOUR
T1 - An authentication strategy based on spatiotemporal chaos for software copyright protection
AU - Cao, L
AU - Lou, Y
AU - Bi, J
AU - Qiu, S
AU - Lu, Z
AU - Harkin, Jim
AU - McDaid, Liam
PY - 2015/12/1
Y1 - 2015/12/1
N2 - An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].
AB - An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].
KW - Authentication strategy
KW - copyright protection
KW - FPGA hardware
KW - security performance
M3 - Article
VL - 8
SP - 4073
EP - 4086
JO - Security and Communication Networks
T2 - Security and Communication Networks
JF - Security and Communication Networks
SN - 1939-0114
IS - 18
ER -