An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo-random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. An authentication strategy based on spatiotemporal chaos for software copyright protection. Available from: http://www.researchgate.net/publication/280874820_An_authentication_strategy_based_on_spatiotemporal_chaos_for_software_copyright_protection [accessed Nov 17, 2015].
|Journal||Security and Communication Networks|
|Publication status||Published - 1 Dec 2015|
- Authentication strategy
- copyright protection
- FPGA hardware
- security performance
Cao, L., Lou, Y., Bi, J., Qiu, S., Lu, Z., Harkin, J., & McDaid, L. (2015). An authentication strategy based on spatiotemporal chaos for software copyright protection. Security and Communication Networks, 8(18), 4073-4086.