• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A hardware-enabled certificate of authenticity system with intrinsically high entropy

Lakafosis, Vasileios 09 April 2013 (has links)
The objective of the proposed research is the design and fabrication of a novel stand-alone wireless robust system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. The system consists of two major components; the near-field certificates of authenticity (CoA), which serve as authenticity vouchers of the products they are attached to, and a microcontroller-enabled, low-power and low-cost reader. Small-sized passive physical three-dimensional structures that are composed of extremely cheap conductive and dielectric materials are shown to yield a unique and repeatable RF signature in a small portion of the frequency spectrum when brought in the reactive and radiating near-field regions of an array of miniature antennas. The multidimensional features of these CoAs, or in other words their signature or fingerprint, are cryptographically signed and digitally stored. The contactless signature validation procedure, in which an attempt to associate the near-field signature response of the physical CoA with the digitized signature, is carried out by the reader designed and fabricated. This low-cost reader operates autonomously and in an offline fashion. The feasibility and performance robustness of the system, in terms of accuracy, consistency and speed of capturing of the signatures, is rigorously assessed with a wide array of tests. Moreover, the entropy, or uncertainty, of the signatures generated by the system are empirically quantified and verified to achieve a virtually impossible false alarm. The aforementioned characteristics of the realized authentication system make it applicable to a vast array of physical objects that needs protection against counterfeiters.

Page generated in 0.0916 seconds