Binding IOT to Smart Non-Fungible Tokens Using PUF

PDF Publication Title:

Binding IOT to Smart Non-Fungible Tokens Using PUF ( binding-iot-smart-non-fungible-tokens-using-puf )

Previous Page View | Next Page View | Return to Search List

Text from PDF Page: 012

Sensors 2021, 21, 3119 Sensors 2021, 21, x FOR PEER REVIEW IoT Device 12 of 23 13 of 23 Owner Smart NFT Timeout interrupt Get token information from device BCA address Save owner BCA address Information Set operating mode: Waiting for owner Generate the pair (SKOD,PKOD) for communication, set K_O = SKOD*PKDEV Check owner signature RequestEngage (PKOD) Generate secret K_D = SKDEV*PKOD hashK_D PKOD, hashK_O Check if hashK_O = hashK_D Set operating mode: Engaged with owner Event: OwnerEngaged FFigiguurree33..SSteteppssininssuuccceesssfufulloownneerraannddddeevviciceemuututuaallaauuththeenntitcicaatitoionn.. IfIfththeeddeevviciceeccoonnssuultlstsththeebblolocckkcchhaaininaannddththeestsatateteooffitistssmsmaartrtNNFFTTisisWaaitiitninggfoforruusesre,r, the device saves in its memory the user BCA address. Then, a mutual authentication pro- the device saves in its memory the user BCA address. Then, a mutual authentication pro- cess is carried out with the user, as already done with the owner. The user generates a pair cess is carried out with the user, as already done with the owner. The user generates a pair of keys, a private key (SK ) and a public key (PK ), proposes K_U = SK ·PK as ofkeys,aprivatekey(𝑆𝐾UD)andapublickey(𝑃𝐾UD),proposes 𝐾_𝑈=𝑆𝐾UD·𝑃𝐾DEVas 𝑈𝐷 𝑈𝐷 𝑈𝐷 𝐷𝐸𝑉 secret to share with the device to establish a secure communication channel, and publishes secret to share with the device to establish a secure communication channel, and publishes PK as dataEngagement and the hash of K_U as hashK_U with the function startUserEn- 𝑃𝐾 UDas dataEngagement and the hash of 𝐾_𝑈 as hashK_U with the function startUserEn- gagement. The user requests the device to finish engagement. The device validates the gagement. The user requests the device to finish engagement. The device validates the user 𝑈𝐷 user request, generates its secret as K_D = SK ·PK , and sends the hash of K_D as request, generates its secret as 𝐾_𝐷 = 𝑆𝐾 ·D𝑃E𝐾V 𝐷𝐸𝑉 𝑈𝐷 , UaDnd sends the hash of 𝐾_𝐷 as hashK_D with the function userEngagement. If everything is correctly done, K_U and K_D hashK_D with the function userEngagement. If everything is correctly done, 𝐾_𝑈 and 𝐾_𝐷 are the same, and the function changes the state of the token to Engaged with user, updates are the same, and the function changes the state of the token to Engaged with user, updates the timestamp, and sends the event UserEngaged. Once the device receives the event, it the timestamp, and sends the event UserEngaged. Once the device receives the event, it changes its operation mode to Engaged with user. This process is shown in Figure 4. From changes its operation mode to Engaged with user. This process is shown in Figure 4. From this moment, the user can employ the device and upload their own software, SWUSER, to this moment, the user can employ the device and upload their own software, SWUSER, to configure and program the device accordingly to its use. If the mutual authentication of configure and program the device accordingly to its use. If the mutual authentication of the device with the owner or with the user is not finished with engagement, the owner or the device with the owner or with the user is not finished with engagement, the owner or user can publish the private key (SKOD and SKUD, respectively) if they want to show that user can publish the private key (𝑆𝐾𝑂𝐷 and 𝑆𝐾𝑈𝐷, respectively) if they want to show that the fail was on the side of the device and not on their side. the fail was on the side of the device and not on their side. The shared secrets agreed between devices and owners and between devices and users The shared secrets agreed between devices and owners and between devices and us- are sensitive information since, from them, and using a key derivation function (KDF), ers are sensitive information since, from them, and using a key derivation function (KDF), fresh session cryptographic keys can be derived for secure communication. Hence, the fresh session cryptographic keys can be derived for secure communication. Hence, the device obfuscates them with its PUF and reconstructs them with helper data stored in its device obfuscates them with its PUF and reconstructs them with helper data stored in its NVM, in the same way as explained for its private key, SKDEV. Once reconstructed, the NVM, in the same way as explained for its private key, SKDEV. Once reconstructed, the device checks them with the attributes hashK_OD and hashK_UD in its token. device checks them with the attributes hashK_OD and hashK_UD in its token. If YES, Set state: Engaged with owner

PDF Image | Binding IOT to Smart Non-Fungible Tokens Using PUF

PDF Search Title:

Binding IOT to Smart Non-Fungible Tokens Using PUF

Original File Name Searched:

sensors-21-03119.pdf

DIY PDF Search: Google It | Yahoo | Bing

NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info

IT XR Project Redstone NFT Available for Sale: NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Be part of the future with this NFT. Can be bought and sold but only one design NFT exists. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info

Infinity Turbine IT XR Project Redstone Design: NFT for sale... NFT for high tech turbine design with one part 3D printed counter-rotating energy turbine. Includes all rights to this turbine design, including license for Fluid Handling Block I and II for the turbine assembly and housing. The NFT includes the blueprints (cad/cam), revenue streams, and all future development of the IT XR Project Redstone... More Info

Infinity Turbine ROT Radial Outflow Turbine 24 Design and Worldwide Rights: NFT for sale... NFT for the ROT 24 energy turbine. Be part of the future with this NFT. This design can be bought and sold but only one design NFT exists. You may manufacture the unit, or get the revenues from its sale from Infinity Turbine. Royalties go to the developer (Infinity) to keep enhancing design and applications... More Info

Infinity Supercritical CO2 10 Liter Extractor Design and Worldwide Rights: The Infinity Supercritical 10L CO2 extractor is for botanical oil extraction, which is rich in terpenes and can produce shelf ready full spectrum oil. With over 5 years of development, this industry leader mature extractor machine has been sold since 2015 and is part of many profitable businesses. The process can also be used for electrowinning, e-waste recycling, and lithium battery recycling, gold mining electronic wastes, precious metals. CO2 can also be used in a reverse fuel cell with nafion to make a gas-to-liquids fuel, such as methanol, ethanol and butanol or ethylene. Supercritical CO2 has also been used for treating nafion to make it more effective catalyst. This NFT is for the purchase of worldwide rights which includes the design. More Info

NFT (Non Fungible Token): Buy our tech, design, development or system NFT and become part of our tech NFT network... More Info

Infinity Turbine Products: Special for this month, any plans are $10,000 for complete Cad/Cam blueprints. License is for one build. Try before you buy a production license. May pay by Bitcoin or other Crypto. Products Page... More Info

CONTACT TEL: 608-238-6001 Email: greg@infinityturbine.com (Standard Web Page)