An authentication strategy based on spatiotemporal chaos for software copyright protection. Issue 18 (6th August 2015)
- Record Type:
- Journal Article
- Title:
- An authentication strategy based on spatiotemporal chaos for software copyright protection. Issue 18 (6th August 2015)
- Main Title:
- An authentication strategy based on spatiotemporal chaos for software copyright protection
- Authors:
- Cao, Lvchen
Luo, Yuling
Bi, Jinjie
Qiu, Senhui
Lu, Zhenkun
Harkin, Jim
McDaid, Liam - Abstract:
- Abstract: An authentication strategy is proposed in this paper for embedded system software copyright protection. It employs a chaotic coupled map lattices (CML) system to generate the pseudo‐random numbers, which are used to construct message authentication codes (MAC) for embedded system authentication. The CML has multiple lattices where the adjacent lattices have coupled effect. When the system initial condition (e.g. lattice values and system parameters) has a marginal change, the output will have a significant change. Therefore, the proposed scheme is highly secure as the final MAC is almost impossible to be compromised. The experiment is conducted on the platform of field programmable gate array, and its corresponding results demonstrate that the proposed strategy achieved a good security performance, a high computing speed and a relatively low area overhead. Copyright © 2015 John Wiley & Sons, Ltd. Abstract : The findings of this paper are as follows: a pseudo‐random number sequence generator design using the CML‐based chaos system, an authentication strategy and a workflow for the software copyright protection and a hardware implementation and a performance analysis of the embedded security module.
- Is Part Of:
- Security and communication networks. Volume 8:Issue 18(2015)
- Journal:
- Security and communication networks
- Issue:
- Volume 8:Issue 18(2015)
- Issue Display:
- Volume 8, Issue 18 (2015)
- Year:
- 2015
- Volume:
- 8
- Issue:
- 18
- Issue Sort Value:
- 2015-0008-0018-0000
- Page Start:
- 4073
- Page End:
- 4086
- Publication Date:
- 2015-08-06
- Subjects:
- authentication strategy -- copyright protection -- CML -- pseudo‐random -- MAC -- security performance
Computer networks -- Security measures -- Periodicals
Computer security -- Periodicals
Cryptography -- Periodicals
005.805 - Journal URLs:
- http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 ↗
https://www.hindawi.com/journals/scn/ ↗
http://onlinelibrary.wiley.com/ ↗ - DOI:
- 10.1002/sec.1324 ↗
- Languages:
- English
- ISSNs:
- 1939-0114
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD Digital store
- Ingest File:
- 10958.xml