Skip to main content

RF Nanostructured Security

  • Chapter
  • First Online:
  • 895 Accesses

Part of the book series: Modeling and Optimization in Science and Technologies ((MOST,volume 9))

Abstract

This chapter gives an intensive overview of some recent micro‐ and nanostructured Radio Frequency (RF) security issues. It identifies the challenges of tomorrow’s security problems and why this has been a big relevance not only to nano-communications but also to other applications. A short overview on the traditional Physical Unclonable Functions (PUFs) introduces the reader into the concept of applied electromagnetic waves interacting with nanomaterials. Major security and fingerprinting contributions, which are newly‐proposed and implemented by the authors, are concluded in this chapter. These security techniques are based on artificially‐synthesized disordered micro and nano materials. A potential on‐chip realization and integration scenario of such approach is also discussed. Novel material synthesis technologies and functional prototype production processes are illustrated. Extraction process of RF fingerprints, based on near‐field scattering measurements, is included as well. Finally, statistical analysis and distance measures of similarity, uniqueness and orthogonality of the extracted fingerprints are carefully investigated at the end of this chapter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Pappu R, Recht B, Taylor J, Gershenfeld N (2002) Physical one-way functions. Science 297:2026–2030

    Article  Google Scholar 

  2. Lakafosis V, Traille A, Lee H, Gebara E, Tentzeris MM, De Jean GR, Kirovski D (2011) RF fingerprinting physical objects for anticounterfeiting applications. IEEE Trans Microw Theor Tech 59:504–514

    Google Scholar 

  3. Tuyls P, Schrijen G-J, Skoric B, Geloven J-V, Verhaegh N, Wolters R (2006) Read-proof hardware from protective coatings. In: 8th International Conference on Cryptographic Hardware and Embedded Systems, pp 369–383

    Google Scholar 

  4. Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24:381–394

    Google Scholar 

  5. Bolotnyy L, Robins R (2007) Physically unclonable function-based security and privacy in RFID systems. In: 5th IEEE international conference on pervasive computing and communications, pp 211–220

    Google Scholar 

  6. Maiti A, Kim I, Schaumont P (2012) A robust physical unclonable function with enhanced challenge-response set. IEEE Trans Inf Forensics Secur 7:333–345

    Google Scholar 

  7. Cobb WE, Laspe ED, Baldwin RO, Temple Michael A, Kim YC (2012) Intrinsic physical-layer authentication of integrated circuits. IEEE Trans Inf Forensics Secur 7:14–24

    Google Scholar 

  8. Kheir M, Kreft H, Knöchel R (2013) Nanostructured RFID technology: attack-response and temperature-robustness investigations. In: 43rd European microwave conference (EuMC), Nuremberg—Germany, 2013

    Google Scholar 

  9. Kreft H. Tamper-protected hardware and methods for using same. International Patent PCT/EP2012/054248, European Patent Office Ref. no. WO123400

    Google Scholar 

  10. Kreft H, Adi W (2012) Cocoon-PUF, a novel mechatronic secure element technology. In: NASA/ESA conference on adaptive hardware and systems, Erlangen—Germany, 2012

    Google Scholar 

  11. Kheir M, Kreft H, Knöchel R (2013) RF identification and security technique for highly-secure UWB information systems. In: 24th IEEE personal, indoor and mobile radio communications (PIMRC), London—UK, 2013

    Google Scholar 

  12. Kheir M, Kreft H, Hölken I, Knöchel R (2014) On the physical robustness of RF on-chip nanostructured security. J Inf Secur Appl (Elsevier). doi:10.1016/j.jisa.2014.09.007

    Google Scholar 

  13. Kheir M, Kreft H, Knöchel R (2014) A novel RF fingerprinting approach for hardware integrated security. J Inf Secur Appl (Elsevier). ISSN 2214-2126. http://dx.doi.org/10.1016/j.jisa.2014.02.001

  14. Shivola Ari (1999) Electromagnetic mixing formulas and applications. IET Press, London—UK

    Book  Google Scholar 

  15. Merrill WM, Diaz RE, LoRe MM, Squires MC, Alexopoulos NG (1999) Effective medium theories for artificial materials composed of multiple sizes of spherical inclusions in a host continuum. IEEE Trans Antennas Propagation 47:142–111

    Google Scholar 

  16. Charinpanitkul T, Nartpochananon P, Satitpitakun T, Wilcox J, Seto T, Otani Y (2012) Facile synthesis of tetrapodal ZnO nanoparticles by modified french process and its photoluminescence. J Ind Eng Chem 18:469–473

    Article  Google Scholar 

  17. Zhou RF, Xu XY, Feng HT, Yan D, Li HJ, Cheng S, Yan PX (2010) Morphology controlled syntheses, growth mechanisms, and optical properties of ZnO nanocombs, nanotetrapods. Adv Mater Res 97–101:960–964

    Article  Google Scholar 

  18. Gogotsi Y (2006) Carbon nanomaterials. Taylor and Francis Group

    Google Scholar 

  19. Santini S, Jain R (1999) Similarity measures. IEEE Trans Pattern Anal Mach Intell 12:871–883

    Google Scholar 

  20. Theodoridis S, Koutroumbas K (2006) Pattern recognition, 3rd edn. Elsevier, USA

    Google Scholar 

  21. Cha S-H (2007) Comprehensive survey on distance/similarity measures between probability density functions. Int J Math Models Methods Appl Sci 1:300–307

    Google Scholar 

Download references

Acknowledgements

The authors wish to acknowledge the support of Prof. Rainer Adelung, Head of Functional Nanomaterials Group, University of Kiel, Germany, for providing the nanocomposites used in our experiments and for the informative discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Kheir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kheir, M., Kreft, H., Hölken, I., Knöchel, R. (2017). RF Nanostructured Security. In: Suzuki, J., Nakano, T., Moore, M. (eds) Modeling, Methodologies and Tools for Molecular and Nano-scale Communications. Modeling and Optimization in Science and Technologies, vol 9. Springer, Cham. https://doi.org/10.1007/978-3-319-50688-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-50688-3_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-50686-9

  • Online ISBN: 978-3-319-50688-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics