Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?

Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tamperin...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhang, Junqing, Chang, Chip Hong, Gu, Chongya, Hanzo, Lajos
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/174141
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-174141
record_format dspace
spelling sg-ntu-dr.10356-1741412024-03-22T15:41:13Z Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies? Zhang, Junqing Chang, Chip Hong Gu, Chongya Hanzo, Lajos School of Electrical and Electronic Engineering Engineering Internet of Things Security Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we envisage a combined mutual authentication and key establishment scheme to shed light on their synergy. Ministry of Education (MOE) Submitted/Accepted version The work of J. Zhang was supported by Royal Society Research Grants under grant ID RGS/R1/191241 and the Engineering and Physical Sciences Research Council under grant ID EP/V027697/1. The work of C. H. Chang was supported by the Ministry of Education, Singapore, under its AcRF Tier 2 Award No. MOE-T2EP50220-0003. C. Gu would like to acknowledge the funding of the Royal Society Research Grant IEC/NSFC/211024, the EPSRC EP/N508664/-CSIT2, and the EPSRC Quantum Communications Hub (EP/ T001011/1). L. Hanzo would like to acknowledge the financial support of the Engineering and Physical Sciences Research Council projects EP/P034284/1 and EP/P003990/1 (COALESCE) as well as of the European Research Council’s Advanced Fellow Grant QuantCom (Grant No. 789028). 2024-03-18T06:12:08Z 2024-03-18T06:12:08Z 2022 Journal Article Zhang, J., Chang, C. H., Gu, C. & Hanzo, L. (2022). Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?. IEEE Network, 36(6), 68-75. https://dx.doi.org/10.1109/MNET.107.2100372 0890-8044 https://hdl.handle.net/10356/174141 10.1109/MNET.107.2100372 2-s2.0-85135753503 6 36 68 75 en MOE-T2EP50220-0003 IEEE Network © 2022 IEEE. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1109/MNET.107.2100372. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering
Internet of Things
Security
spellingShingle Engineering
Internet of Things
Security
Zhang, Junqing
Chang, Chip Hong
Gu, Chongya
Hanzo, Lajos
Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
description Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tampering and memory attacks. This article reviews two emerging lightweight hardware-oriented solutions to avoid these problems, namely radio frequency fingerprint (RFF) identification and physical unclonable function (PUF) authentication. Their operating principles and protocols are first introduced, followed by a scrutiny of their common and distinctive features, and a discussion of the stumbling blocks in the way of their market adoption. Finally, we envisage a combined mutual authentication and key establishment scheme to shed light on their synergy.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Zhang, Junqing
Chang, Chip Hong
Gu, Chongya
Hanzo, Lajos
format Article
author Zhang, Junqing
Chang, Chip Hong
Gu, Chongya
Hanzo, Lajos
author_sort Zhang, Junqing
title Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
title_short Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
title_full Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
title_fullStr Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
title_full_unstemmed Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
title_sort radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
publishDate 2024
url https://hdl.handle.net/10356/174141
_version_ 1794549460496285696