Skip to main navigation Skip to search Skip to main content

Time Stamped Bijective MAC and Dynamic PUF Authentication New Directions for IoT Security: Invited Paper

  • Pascal Urien

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper introduces the time stamped bijective MAC algorithm (bMAC), which aims at proving firmware integrity in embedded systems. bMAC computes a MAC over a set of memories, in a pseudo random way relying on a permutation. It is based on exponential permutations that induce computing time distributions. Because bMAC performs calculations on SRAM content, it can be bound to physical chips, by means Physical Unclonable Functions (PUF), extracted from SRAM.

Original languageEnglish
Title of host publication2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020
EditorsPascal Urien, Selwyn Piramuthu
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728157979
DOIs
Publication statusPublished - 1 Feb 2020
Event6th International Conference on Mobile and Secure Services, MOBISECSERV 2020 - Miami, United States
Duration: 22 Feb 202023 Feb 2020

Publication series

Name2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020

Conference

Conference6th International Conference on Mobile and Secure Services, MOBISECSERV 2020
Country/TerritoryUnited States
CityMiami
Period22/02/2023/02/20

Keywords

  • Firmware Integrity
  • PUF
  • Security
  • bMAC

Fingerprint

Dive into the research topics of 'Time Stamped Bijective MAC and Dynamic PUF Authentication New Directions for IoT Security: Invited Paper'. Together they form a unique fingerprint.

Cite this