A Strong Mutual Authentication Protocol for SHIELD

Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting the IC supply chain. Our study demonstrates that the newly started...

Full description

Bibliographic Details
Main Authors: OZCANHAN, M. H., TURKSONMEZ, H.
Format: Article
Language:English
Published: Stefan cel Mare University of Suceava 2020-11-01
Series:Advances in Electrical and Computer Engineering
Subjects:
Online Access:http://dx.doi.org/10.4316/AECE.2020.04010
id doaj-02539fa9bc344c96b68b0b29f296a3c2
record_format Article
spelling doaj-02539fa9bc344c96b68b0b29f296a3c22020-11-29T09:56:10ZengStefan cel Mare University of SuceavaAdvances in Electrical and Computer Engineering1582-74451844-76002020-11-01204819010.4316/AECE.2020.04010A Strong Mutual Authentication Protocol for SHIELDOZCANHAN, M. H.TURKSONMEZ, H.Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting the IC supply chain. Our study demonstrates that the newly started threat mitigation initiative of Defense Advanced Research Projects Agency's (DARPA) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) scheme has not matured yet, and the proposed authentication protocol improvements are still vulnerable to known non-invasive, side-channel attacks. In present work, a novel authentication protocol based on strong mutual authentication is proposed, which resists the demonstrated attacks on previous schemes. The security and performance comparison with the previous work is provided, to inform the IC community about the seriousness of the weaknesses, in previous works. The comparison results show that our proposed protocol exchanges more information, uses more memory and makes more encryption computations. Thus, although our proposed scheme consumes more energy, it has the security required by SHIELD. The outcome forces IC producers to provide enough memory and processing power in a small die area, if the electronic defense IC supply chain is to have the expected security.http://dx.doi.org/10.4316/AECE.2020.04010access controlauthenticationcomputer securityintegrated circuitsradiofrequency identification
collection DOAJ
language English
format Article
sources DOAJ
author OZCANHAN, M. H.
TURKSONMEZ, H.
spellingShingle OZCANHAN, M. H.
TURKSONMEZ, H.
A Strong Mutual Authentication Protocol for SHIELD
Advances in Electrical and Computer Engineering
access control
authentication
computer security
integrated circuits
radiofrequency identification
author_facet OZCANHAN, M. H.
TURKSONMEZ, H.
author_sort OZCANHAN, M. H.
title A Strong Mutual Authentication Protocol for SHIELD
title_short A Strong Mutual Authentication Protocol for SHIELD
title_full A Strong Mutual Authentication Protocol for SHIELD
title_fullStr A Strong Mutual Authentication Protocol for SHIELD
title_full_unstemmed A Strong Mutual Authentication Protocol for SHIELD
title_sort strong mutual authentication protocol for shield
publisher Stefan cel Mare University of Suceava
series Advances in Electrical and Computer Engineering
issn 1582-7445
1844-7600
publishDate 2020-11-01
description Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting the IC supply chain. Our study demonstrates that the newly started threat mitigation initiative of Defense Advanced Research Projects Agency's (DARPA) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) scheme has not matured yet, and the proposed authentication protocol improvements are still vulnerable to known non-invasive, side-channel attacks. In present work, a novel authentication protocol based on strong mutual authentication is proposed, which resists the demonstrated attacks on previous schemes. The security and performance comparison with the previous work is provided, to inform the IC community about the seriousness of the weaknesses, in previous works. The comparison results show that our proposed protocol exchanges more information, uses more memory and makes more encryption computations. Thus, although our proposed scheme consumes more energy, it has the security required by SHIELD. The outcome forces IC producers to provide enough memory and processing power in a small die area, if the electronic defense IC supply chain is to have the expected security.
topic access control
authentication
computer security
integrated circuits
radiofrequency identification
url http://dx.doi.org/10.4316/AECE.2020.04010
work_keys_str_mv AT ozcanhanmh astrongmutualauthenticationprotocolforshield
AT turksonmezh astrongmutualauthenticationprotocolforshield
AT ozcanhanmh strongmutualauthenticationprotocolforshield
AT turksonmezh strongmutualauthenticationprotocolforshield
_version_ 1724412356375609344