Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication

View through CrossRef
Computation offloading is a key technology in mobile edge computing (MEC) that addresses the performance and energy constraints faced by mobile devices when handling computationally intensive tasks. Identity authentication for computation offloading is a critical issue as it ensures data security and user identity legitimate verification. Semiconductor superlattice physical unclonable functions (SSL-PUFs) are unique physical characteristics based on semiconductor superlattice materials, which can be used for secure authentication and encrypted communication in edge computing with wide applications in security authentication. However, the adoption of SSL-PUF in computation offloading for MEC applications faces two practical challenges: insufficient alignment accuracy of response signals and poor stability of SSL-PUF response signals. To address these two issues, an efficient post-processing algorithm specifically designed for SSL-PUF has been proposed. This algorithm consists of two steps. The first step involves aligning the re-sponse signals of SSL-PUF using a sequence alignment algorithm based on preset sequence, which significantly reduces the intra-chip Hamming distance of SSL-PUF. Then, a data fusion algorithm combining time majority voting mechanism is used to filter out erroneous response data, thereby improving the accuracy of SSL-PUF response signals. Experimental results demonstrate that after applying the proposed post-processing algorithm, the randomness of the signals remains largely unaffected. The maximum bit error rate of SSL-PUF response signals is reduced by 34.33%, and the average intra-chip Hamming distance decreases from 12% to 4.9%. The reliability of SSL-PUF is significantly enhanced, making it promising for secure identity authentication in mobile edge computing.
Auricle Global Society of Education and Research
Title: An Efficient Post-Processing Method for SSL-PUF in MEC Security Authentication
Description:
Computation offloading is a key technology in mobile edge computing (MEC) that addresses the performance and energy constraints faced by mobile devices when handling computationally intensive tasks.
Identity authentication for computation offloading is a critical issue as it ensures data security and user identity legitimate verification.
Semiconductor superlattice physical unclonable functions (SSL-PUFs) are unique physical characteristics based on semiconductor superlattice materials, which can be used for secure authentication and encrypted communication in edge computing with wide applications in security authentication.
However, the adoption of SSL-PUF in computation offloading for MEC applications faces two practical challenges: insufficient alignment accuracy of response signals and poor stability of SSL-PUF response signals.
To address these two issues, an efficient post-processing algorithm specifically designed for SSL-PUF has been proposed.
This algorithm consists of two steps.
The first step involves aligning the re-sponse signals of SSL-PUF using a sequence alignment algorithm based on preset sequence, which significantly reduces the intra-chip Hamming distance of SSL-PUF.
Then, a data fusion algorithm combining time majority voting mechanism is used to filter out erroneous response data, thereby improving the accuracy of SSL-PUF response signals.
Experimental results demonstrate that after applying the proposed post-processing algorithm, the randomness of the signals remains largely unaffected.
The maximum bit error rate of SSL-PUF response signals is reduced by 34.
33%, and the average intra-chip Hamming distance decreases from 12% to 4.
9%.
The reliability of SSL-PUF is significantly enhanced, making it promising for secure identity authentication in mobile edge computing.

Related Results

Converged RAN/MEC slicing in beyond 5G (B5G) networks
Converged RAN/MEC slicing in beyond 5G (B5G) networks
(English) The main objective of this thesis is to propose solutions for implementing dynamic RAN slicing and Functional Split (FS) along with MEC placements in 5G/B5G. In particula...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Comparison of Performance Analysis of Comodo SSL and Let's Encypt SSL (Case Study: Bukalapak and Tokopedia)
Comparison of Performance Analysis of Comodo SSL and Let's Encypt SSL (Case Study: Bukalapak and Tokopedia)
The world is becoming connected with the internet, the arrival of the internet has greatly influenced new network technology. The number of internet users is increasing day by day,...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
A TRNG Implemented Using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture
A TRNG Implemented Using a Soft-Data Based Sponge Function within a Unified Strong PUF Architecture
Hardware security primitives including True Random Number Generators (TRNG) and Physical Unclonable Functions (PUFs) are central components to establishing a root of trust in micro...
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
<p>In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (PUF) are discussed individually but only a few of them include unified ...
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
Design of a Unified XOR Ring Oscillator PUF-TRNG Circuit in 45nm CMOS Technology
<p>In previous papers various True Random Number Generators (TRNG) and Physically Unclonable Function (PUF) are discussed individually but only a few of them include unified ...

Back to Top