ASID: Accessible Secure Unique Identification File Based Device Security in Next Generation Blockchains

被引:3
|
作者
Alkhodair, Ahmad J. [1 ]
Mohanty, Saraju P. [1 ]
Kougianos, Elias [2 ]
机构
[1] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ North Texas, Dept Elect Engn, Denton, TX 76203 USA
关键词
Cyber Physical Systems (CPS); Internet-of-Things (IoT); Device Authentication; Unique Identification (UID); Unique Node Identification Generator (UDIG); Virtual Node (VN); Genesis Blockchain; Multi-Chain (MC);
D O I
10.1109/ICBC51069.2021.9461120
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new hardware security method is proposed to secure resource-constrained devices using blockchain technology. The new method is utilizing manufacturer parameters of a device, such as PUF, memory, firmware parameters, etc. to create a linked list of unique identification (UID) data, or an identity that could secure, monitor, and act accordingly to ensure device integrity and honesty.
引用
收藏
页数:2
相关论文
共 50 条
  • [31] Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS
    Liu, Niansheng
    Dai, Huaiyu
    Guo, Donghui
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 237 - 242
  • [32] UPSCALING OF A NEXT GENERATION MICROWELL-BASED BETA CELL REPLACEMENT DEVICE
    de Vries, Rick
    Barzegari, Mojtaba
    Mohammed, Sami
    Stell, Adam
    Hermanns, Carolin
    Jetten, Marlon
    de Bont, Denise
    da Silva Filho, Omar Paulino
    Vaithilingam, Vijayganapathy
    Carlier, Aurelie
    Geris, Liesbet
    van Apeldoorn, Aart
    TISSUE ENGINEERING PART A, 2022, 28 : S112 - S112
  • [33] An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme
    Chin, Ji-Jian
    Behnia, Rouzbeh
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 27 - 32
  • [34] Service-Oriented Architecture based Approach for Secure Video Transmission in Next Generation Networks
    Mogale, Hope
    Esiefarienrhe, Bukohwo Michael
    5TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, BIG DATA, COMPUTING AND DATA COMMUNICATION SYSTEMS (ICABCD2022), 2022,
  • [35] A secure and optimized location update for next generation proxy mobility based internet protocol networks
    Mathi, Senthilkumar
    Khatri, Anshu
    Sethuraman, Maanasaa
    Anbarasi, P. N.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (03) : 2443 - 2453
  • [36] Next Generation Systems - Commercial Software and Free Software comparative Based on IDPS Security
    Mejia Miranda, Jezreel
    Peralta Mtz, Faleg A.
    2017 6TH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS IMPROVEMENT (CIMPS), 2017,
  • [37] Resilience-Based Performance Measures for Next-Generation Systems Security Engineering
    Williams, Adam D.
    Adams, Thomas
    Wingo, Jamie
    Birch, Gabriel C.
    Caskey, Susan A.
    Fleming, Elizabeth S.
    Gunda, Thushara
    2021 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2021,
  • [38] Conceptual Design of Next Generation Security System Based on Thought Form Image Patterns
    Prasad, Rai Sachindra
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 99 - 116
  • [39] Application of next generation semiconductor based sequencing for species identification in dairy products
    Ribani, Anisa
    Schiavo, Giuseppina
    Utzeri, Valerio Joe
    Bertolini, Francesca
    Geraci, Claudia
    Bovo, Samuele
    Fontanesi, Luca
    FOOD CHEMISTRY, 2018, 246 : 90 - 98
  • [40] Modified device key generation algorithm and A* algorithm to optimize the security measures based on trust value in device-to-device communications
    Gayathri, V. M.
    Supraja, P.
    Sulthana, A. Razia
    Mukunthan, P.
    SOFT COMPUTING, 2022, 26 (23) : 13081 - 13096