Abstract
This chapter gives an intensive overview of some recent micro‐ and nanostructured Radio Frequency (RF) security issues. It identifies the challenges of tomorrow’s security problems and why this has been a big relevance not only to nano-communications but also to other applications. A short overview on the traditional Physical Unclonable Functions (PUFs) introduces the reader into the concept of applied electromagnetic waves interacting with nanomaterials. Major security and fingerprinting contributions, which are newly‐proposed and implemented by the authors, are concluded in this chapter. These security techniques are based on artificially‐synthesized disordered micro and nano materials. A potential on‐chip realization and integration scenario of such approach is also discussed. Novel material synthesis technologies and functional prototype production processes are illustrated. Extraction process of RF fingerprints, based on near‐field scattering measurements, is included as well. Finally, statistical analysis and distance measures of similarity, uniqueness and orthogonality of the extracted fingerprints are carefully investigated at the end of this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pappu R, Recht B, Taylor J, Gershenfeld N (2002) Physical one-way functions. Science 297:2026–2030
Lakafosis V, Traille A, Lee H, Gebara E, Tentzeris MM, De Jean GR, Kirovski D (2011) RF fingerprinting physical objects for anticounterfeiting applications. IEEE Trans Microw Theor Tech 59:504–514
Tuyls P, Schrijen G-J, Skoric B, Geloven J-V, Verhaegh N, Wolters R (2006) Read-proof hardware from protective coatings. In: 8th International Conference on Cryptographic Hardware and Embedded Systems, pp 369–383
Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24:381–394
Bolotnyy L, Robins R (2007) Physically unclonable function-based security and privacy in RFID systems. In: 5th IEEE international conference on pervasive computing and communications, pp 211–220
Maiti A, Kim I, Schaumont P (2012) A robust physical unclonable function with enhanced challenge-response set. IEEE Trans Inf Forensics Secur 7:333–345
Cobb WE, Laspe ED, Baldwin RO, Temple Michael A, Kim YC (2012) Intrinsic physical-layer authentication of integrated circuits. IEEE Trans Inf Forensics Secur 7:14–24
Kheir M, Kreft H, Knöchel R (2013) Nanostructured RFID technology: attack-response and temperature-robustness investigations. In: 43rd European microwave conference (EuMC), Nuremberg—Germany, 2013
Kreft H. Tamper-protected hardware and methods for using same. International Patent PCT/EP2012/054248, European Patent Office Ref. no. WO123400
Kreft H, Adi W (2012) Cocoon-PUF, a novel mechatronic secure element technology. In: NASA/ESA conference on adaptive hardware and systems, Erlangen—Germany, 2012
Kheir M, Kreft H, Knöchel R (2013) RF identification and security technique for highly-secure UWB information systems. In: 24th IEEE personal, indoor and mobile radio communications (PIMRC), London—UK, 2013
Kheir M, Kreft H, Hölken I, Knöchel R (2014) On the physical robustness of RF on-chip nanostructured security. J Inf Secur Appl (Elsevier). doi:10.1016/j.jisa.2014.09.007
Kheir M, Kreft H, Knöchel R (2014) A novel RF fingerprinting approach for hardware integrated security. J Inf Secur Appl (Elsevier). ISSN 2214-2126. http://dx.doi.org/10.1016/j.jisa.2014.02.001
Shivola Ari (1999) Electromagnetic mixing formulas and applications. IET Press, London—UK
Merrill WM, Diaz RE, LoRe MM, Squires MC, Alexopoulos NG (1999) Effective medium theories for artificial materials composed of multiple sizes of spherical inclusions in a host continuum. IEEE Trans Antennas Propagation 47:142–111
Charinpanitkul T, Nartpochananon P, Satitpitakun T, Wilcox J, Seto T, Otani Y (2012) Facile synthesis of tetrapodal ZnO nanoparticles by modified french process and its photoluminescence. J Ind Eng Chem 18:469–473
Zhou RF, Xu XY, Feng HT, Yan D, Li HJ, Cheng S, Yan PX (2010) Morphology controlled syntheses, growth mechanisms, and optical properties of ZnO nanocombs, nanotetrapods. Adv Mater Res 97–101:960–964
Gogotsi Y (2006) Carbon nanomaterials. Taylor and Francis Group
Santini S, Jain R (1999) Similarity measures. IEEE Trans Pattern Anal Mach Intell 12:871–883
Theodoridis S, Koutroumbas K (2006) Pattern recognition, 3rd edn. Elsevier, USA
Cha S-H (2007) Comprehensive survey on distance/similarity measures between probability density functions. Int J Math Models Methods Appl Sci 1:300–307
Acknowledgements
The authors wish to acknowledge the support of Prof. Rainer Adelung, Head of Functional Nanomaterials Group, University of Kiel, Germany, for providing the nanocomposites used in our experiments and for the informative discussions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kheir, M., Kreft, H., Hölken, I., Knöchel, R. (2017). RF Nanostructured Security. In: Suzuki, J., Nakano, T., Moore, M. (eds) Modeling, Methodologies and Tools for Molecular and Nano-scale Communications. Modeling and Optimization in Science and Technologies, vol 9. Springer, Cham. https://doi.org/10.1007/978-3-319-50688-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-50688-3_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50686-9
Online ISBN: 978-3-319-50688-3
eBook Packages: EngineeringEngineering (R0)