A Strong Mutual Authentication Protocol for SHIELD
Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting the IC supply chain. Our study demonstrates that the newly started...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Stefan cel Mare University of Suceava
2020-11-01
|
Series: | Advances in Electrical and Computer Engineering |
Subjects: | |
Online Access: | http://dx.doi.org/10.4316/AECE.2020.04010 |
id |
doaj-02539fa9bc344c96b68b0b29f296a3c2 |
---|---|
record_format |
Article |
spelling |
doaj-02539fa9bc344c96b68b0b29f296a3c22020-11-29T09:56:10ZengStefan cel Mare University of SuceavaAdvances in Electrical and Computer Engineering1582-74451844-76002020-11-01204819010.4316/AECE.2020.04010A Strong Mutual Authentication Protocol for SHIELDOZCANHAN, M. H.TURKSONMEZ, H.Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting the IC supply chain. Our study demonstrates that the newly started threat mitigation initiative of Defense Advanced Research Projects Agency's (DARPA) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) scheme has not matured yet, and the proposed authentication protocol improvements are still vulnerable to known non-invasive, side-channel attacks. In present work, a novel authentication protocol based on strong mutual authentication is proposed, which resists the demonstrated attacks on previous schemes. The security and performance comparison with the previous work is provided, to inform the IC community about the seriousness of the weaknesses, in previous works. The comparison results show that our proposed protocol exchanges more information, uses more memory and makes more encryption computations. Thus, although our proposed scheme consumes more energy, it has the security required by SHIELD. The outcome forces IC producers to provide enough memory and processing power in a small die area, if the electronic defense IC supply chain is to have the expected security.http://dx.doi.org/10.4316/AECE.2020.04010access controlauthenticationcomputer securityintegrated circuitsradiofrequency identification |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
OZCANHAN, M. H. TURKSONMEZ, H. |
spellingShingle |
OZCANHAN, M. H. TURKSONMEZ, H. A Strong Mutual Authentication Protocol for SHIELD Advances in Electrical and Computer Engineering access control authentication computer security integrated circuits radiofrequency identification |
author_facet |
OZCANHAN, M. H. TURKSONMEZ, H. |
author_sort |
OZCANHAN, M. H. |
title |
A Strong Mutual Authentication Protocol for SHIELD |
title_short |
A Strong Mutual Authentication Protocol for SHIELD |
title_full |
A Strong Mutual Authentication Protocol for SHIELD |
title_fullStr |
A Strong Mutual Authentication Protocol for SHIELD |
title_full_unstemmed |
A Strong Mutual Authentication Protocol for SHIELD |
title_sort |
strong mutual authentication protocol for shield |
publisher |
Stefan cel Mare University of Suceava |
series |
Advances in Electrical and Computer Engineering |
issn |
1582-7445 1844-7600 |
publishDate |
2020-11-01 |
description |
Study shows that counterfeit semiconductors or Integrated Circuits (ICs) are increasingly penetrating into advanced
electronic defense systems. Traditional supply chain management policies have been found unsuccessful in protecting
the IC supply chain. Our study demonstrates that the newly started threat mitigation initiative of Defense Advanced
Research Projects Agency's (DARPA) Supply Chain Hardware Integrity for Electronics Defense (SHIELD) scheme has not
matured yet, and the proposed authentication protocol improvements are still vulnerable to known non-invasive,
side-channel attacks. In present work, a novel authentication protocol based on strong mutual authentication is
proposed, which resists the demonstrated attacks on previous schemes. The security and performance comparison
with the previous work is provided, to inform the IC community about the seriousness of the weaknesses,
in previous works. The comparison results show that our proposed protocol exchanges more information,
uses more memory and makes more encryption computations. Thus, although our proposed scheme consumes
more energy, it has the security required by SHIELD. The outcome forces IC producers to provide enough
memory and processing power in a small die area, if the electronic defense IC supply chain is to have
the expected security. |
topic |
access control authentication computer security integrated circuits radiofrequency identification |
url |
http://dx.doi.org/10.4316/AECE.2020.04010 |
work_keys_str_mv |
AT ozcanhanmh astrongmutualauthenticationprotocolforshield AT turksonmezh astrongmutualauthenticationprotocolforshield AT ozcanhanmh strongmutualauthenticationprotocolforshield AT turksonmezh strongmutualauthenticationprotocolforshield |
_version_ |
1724412356375609344 |