Title | ||
---|---|---|
An authentication strategy based on spatiotemporal chaos for software copyright protection |
Abstract | ||
---|---|---|
An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices CML system to generate the pseudo-random numbers, which are used to construct message authentication codes MAC for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition e.g. lattice values and system parameters has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. Copyright © 2015 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1002/sec.1324 | Security and Communication Networks |
Keywords | Field | DocType |
authentication strategy,copyright protection,CML,pseudo‐random,MAC,security performance | Authentication,Lattice (order),Message authentication code,Computer security,Computer science,Computer network,Field-programmable gate array,Software,Initial value problem,Chaotic,Pseudorandom number generator | Journal |
Volume | Issue | ISSN |
8 | 18 | 1939-0114 |
Citations | PageRank | References |
1 | 0.37 | 16 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lvchen Cao | 1 | 2 | 0.72 |
Yuling Luo | 2 | 13 | 3.01 |
Jinjie Bi | 3 | 1 | 0.37 |
Senhui Qiu | 4 | 11 | 2.54 |
Zhenkun Lu | 5 | 1 | 0.71 |
Jim Harkin | 6 | 325 | 36.82 |
Liam Mcdaid | 7 | 270 | 30.48 |