Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = optical physical unclonable function

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2242 KB  
Review
Advances in Physical Unclonable Functions Based on New Technologies: A Comprehensive Review
by Yuan Cao, Jianxiang Xu, Jichun Wu, Simeng Wu, Zhao Huang and Kaizhao Zhang
Mathematics 2024, 12(1), 77; https://doi.org/10.3390/math12010077 - 25 Dec 2023
Cited by 5 | Viewed by 5908
Abstract
A physical unclonable function (PUF) is a technology designed to safeguard sensitive information and ensure data security. PUFs generate unique responses for each challenge by leveraging random deviations in the physical microstructures of integrated circuits (ICs), making it incredibly difficult to replicate them. [...] Read more.
A physical unclonable function (PUF) is a technology designed to safeguard sensitive information and ensure data security. PUFs generate unique responses for each challenge by leveraging random deviations in the physical microstructures of integrated circuits (ICs), making it incredibly difficult to replicate them. However, traditional silicon PUFs are now susceptible to various attacks, such as modeling attacks using conventional machine learning techniques and reverse engineering strategies. As a result, PUFs based on new materials or methods are being developed to enhance their security. However, in the realm of survey papers, it has come to our attention that there is a notable scarcity of comprehensive summaries and introductions concerning these emerging PUFs. To fill this gap, this article surveys PUFs based on novel technologies in the literature. In particular, we first provide an insightful overview of four types of PUFs that are rooted in advanced technologies: bionic optical PUF, biological PUF, PUF based on printed electronics (PE), and PUF based on memristors. Based on the overview, we further discuss the evaluation results of their performance based on specific metrics and conduct a comparative analysis of their performance. Despite significant progress in areas such as limited entry and regional expertise, it is worth noting that these PUFs still have room for improvement. Therefore, we have identified their potential shortcomings and areas that require further development. Moreover, we outline various applications of PUFs and propose our own future prospects for this technology. To sum up, this article contributes to the understanding of PUFs based on novel technologies by providing an in-depth analysis of their characteristics, performance evaluation, and potential improvements. It also sheds light on the wide range of applications for PUFs and presents enticing prospects for future advancements in this field. Full article
(This article belongs to the Special Issue Trends in Cryptography and Information Security)
Show Figures

Figure 1

12 pages, 3346 KB  
Article
An Optical-Fiber-Based Key for Remote Authentication of Users and Optical Fiber Lines
by Alexander Smirnov, Mikhail Yarovikov, Ekaterina Zhdanova, Alexander Gutor and Mikhail Vyatkin
Sensors 2023, 23(14), 6390; https://doi.org/10.3390/s23146390 - 14 Jul 2023
Cited by 8 | Viewed by 1791
Abstract
We have shown the opportunity to use the unique inhomogeneities of the internal structure of an optical fiber waveguide for remote authentication of users or an optic fiber line. Optical time domain reflectometry (OTDR) is demonstrated to be applicable to observing unclonable backscattered [...] Read more.
We have shown the opportunity to use the unique inhomogeneities of the internal structure of an optical fiber waveguide for remote authentication of users or an optic fiber line. Optical time domain reflectometry (OTDR) is demonstrated to be applicable to observing unclonable backscattered signal patterns at distances of tens of kilometers. The physical nature of the detected patterns was explained, and their characteristic spatial periods were investigated. The patterns are due to the refractive index fluctuations of a standard telecommunication fiber. We have experimentally verified that the patterns are an example of a physically unclonable function (PUF). The uniqueness and reproducibility of the patterns have been demonstrated and an outline of authentication protocol has been proposed. Full article
(This article belongs to the Special Issue Fiber-Optic Transmission and Networking)
Show Figures

Figure 1

14 pages, 2363 KB  
Article
Optical Systems Identification through Rayleigh Backscattering
by Pantea Nadimi Goki, Thomas Teferi Mulugeta, Roberto Caldelli and Luca Potì
Sensors 2023, 23(11), 5269; https://doi.org/10.3390/s23115269 - 1 Jun 2023
Cited by 6 | Viewed by 2281
Abstract
We introduce a technique to generate and read the digital signature of the networks, channels, and optical devices that possess the fiber-optic pigtails to enhance physical layer security (PLS). Attributing a signature to the networks or devices eases the identification and authentication of [...] Read more.
We introduce a technique to generate and read the digital signature of the networks, channels, and optical devices that possess the fiber-optic pigtails to enhance physical layer security (PLS). Attributing a signature to the networks or devices eases the identification and authentication of networks and systems thus reducing their vulnerability to physical and digital attacks. The signatures are generated using an optical physical unclonable function (OPUF). Considering that OPUFs are established as the most potent anti-counterfeiting tool, the created signatures are robust against malicious attacks such as tampering and cyber attacks. We investigate Rayleigh backscattering signal (RBS) as a strong OPUF to generate reliable signatures. Contrary to other OPUFs that must be fabricated, the RBS-based OPUF is an inherent feature of fibers and can be easily obtained using optical frequency domain reflectometry (OFDR). We evaluate the security of the generated signatures in terms of their robustness against prediction and cloning. We demonstrate the robustness of signatures against digital and physical attacks confirming the unpredictability and unclonability features of the generated signatures. We explore signature cyber security by considering the random structure of the produced signatures. To demonstrate signature reproducibility through repeated measurements, we simulate the signature of a system by adding a random Gaussian white noise to the signal. This model is proposed to address services including security, authentication, identification, and monitoring. Full article
(This article belongs to the Special Issue Optical Network and Optical Communication Technology with Sensors)
Show Figures

Figure 1

3 pages, 780 KB  
Proceeding Paper
An Asymmetric Optical Cryptosystem Using Physically Unclonable Functions in the Fresnel Domain
by Vinny Cris Mandapati, Shashi Prabhakar, Harsh Vardhan, Ravi Kumar, Salla Gangi Reddy, Sakshi and Ravindra P. Singh
Eng. Proc. 2023, 34(1), 8; https://doi.org/10.3390/HMAM2-14124 - 6 Mar 2023
Cited by 2 | Viewed by 920
Abstract
In this paper, we propose a new asymmetric cryptosystem for phase image encryption, using the physically unclonable functions (PUFs) as security keys. For encryption, the original amplitude image is first converted into a phase image and modulated with a PUF to obtain a [...] Read more.
In this paper, we propose a new asymmetric cryptosystem for phase image encryption, using the physically unclonable functions (PUFs) as security keys. For encryption, the original amplitude image is first converted into a phase image and modulated with a PUF to obtain a complex image. This complex image is then illuminated with a plane wave, and the complex wavefront at a distance d is recorded. The real part of the complex wavefront is further processed to obtain the encrypted image and the imaginary part is kept as the private key. The polar decomposition approach is utilized to generate two more private security keys and to enable the multi-user capability in the cryptosystem. Numerical simulations confirm the feasibility of the proposed method. Full article
Show Figures

Figure 1

8 pages, 2044 KB  
Communication
Effects of Kerr Nonlinearity in Physical Unclonable Functions
by Georgios M. Nikolopoulos
Appl. Sci. 2022, 12(23), 11985; https://doi.org/10.3390/app122311985 - 23 Nov 2022
Cited by 3 | Viewed by 1895
Abstract
We address the question of whether the presence of Kerr nonlinearity in multiple-scattering optical media offers any advantage with respect to the design of physical unclonable functions. Our results suggest that under certain conditions, nonlinear physical unclonable functions can be more robust against [...] Read more.
We address the question of whether the presence of Kerr nonlinearity in multiple-scattering optical media offers any advantage with respect to the design of physical unclonable functions. Our results suggest that under certain conditions, nonlinear physical unclonable functions can be more robust against the potential cloning of the medium relative to their linear counterparts that have been exploited in the context of various cryptographic applications. Full article
(This article belongs to the Section Quantum Science and Technology)
Show Figures

Figure 1

8 pages, 15566 KB  
Communication
Low Cost and Easy Validation Anticounterfeiting Plasmonic Tags Based on Thin Films of Metal and Dielectric
by Antonio Ferraro, Mauro Daniel Luigi Bruno, Giuseppe Papuzzo, Rosa Varchera, Agostino Forestiero, Maria Penolope De Santo, Roberto Caputo and Riccardo Cristofaro Barberi
Nanomaterials 2022, 12(8), 1279; https://doi.org/10.3390/nano12081279 - 9 Apr 2022
Cited by 8 | Viewed by 2331
Abstract
Multilevel anticounterfeiting Physical Unclonable Function (PUF) tags based on thin film of silver (Ag), Zinc Oxide (ZnO) and PolyVinylPyrrolidone (PVP), are experimentally demonstrated and validated. We exploit the low adhesion of silver to glass and consequent degradation during ZnO deposition to induce morphological [...] Read more.
Multilevel anticounterfeiting Physical Unclonable Function (PUF) tags based on thin film of silver (Ag), Zinc Oxide (ZnO) and PolyVinylPyrrolidone (PVP), are experimentally demonstrated and validated. We exploit the low adhesion of silver to glass and consequent degradation during ZnO deposition to induce morphological randomness. Several photographs of the tag surfaces have been collected with different illumination conditions and using two smartphones of diverse brand. The photos were analyzed using an image recognition algorithm revealing low common minutiae for different tags. Moreover, the optical response reveals peculiar spectra due to labels of plasmonic nature. The proposed systems can be easily fabricated on large areas and represent a cost-effective solution for practical protection of objects. Full article
(This article belongs to the Special Issue New Trends in Metamaterials)
Show Figures

Figure 1

16 pages, 1284 KB  
Article
New Security Improvements in Next-Generation Passive Optical Networks Stage 2
by Vlastimil Clupek, Tomas Horvath, Petr Munster and Vaclav Oujezsky
Appl. Sci. 2019, 9(20), 4430; https://doi.org/10.3390/app9204430 - 18 Oct 2019
Cited by 6 | Viewed by 3738
Abstract
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is controlled by optical line termination (OLT). The broadcast [...] Read more.
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is controlled by optical line termination (OLT). The broadcast transmission method increases security vulnerability because the attacker is able to connect his/her modified optical network unit (ONU) to the free port of the splitter (commonly in the basement). We present the concept for the activation process of ONUs based on physical unclonable function (PUF) for next-generation passive optical networks stage 2 (NG-PON2). The use of PUF increases security in the NG-PON2. Furthermore, the registration identifier (ID) is not stored in a nonvolatile memory, in comparison with the common solution defined by the International Telecommunication Union (ITU) recommendation G.989.3. An attacker cannot perform a reverse engineering attack to obtain the registration ID. For this reason, the attacker cannot clone an ONU. We proposed security improvements that involve authentication, encryption, integrity protection, and data origin verification methods in the NG-PON2. Our model uses the standard implementation of the transmission convergence layer of NG-PON2 with the new physical layer operations, administration, and maintenance (PLOAM) messages. The recommendation G.989.3 allows specifying own PLOAM messages since not all IDs are used in the current specification. Full article
Show Figures

Figure 1

Back to TopTop