Fuzzified advanced robust hashes for identification of digital and physical objects

03/30/2023
by   Shashank Tripathi, et al.
0

With the rising numbers for IoT objects, it is becoming easier to penetrate counterfeit objects into the mainstream market by adversaries. Such infiltration of bogus products can be addressed with third-party-verifiable identification. Generally, state-of-the-art identification schemes do not guarantee that an identifier e.g. barcodes or RFID itself cannot be forged. This paper introduces identification patterns representing the objects intrinsic identity by robust hashes and not only by generated identification patterns. Inspired by these two notions, a collection of uniquely identifiable attributes called quasi-identifiers (QI) can be used to identify an object. Since all attributes do not contribute equally towards an object's identity, each QI has a different contribution towards the identifier. A robust hash developed utilising the QI has been named fuzzified robust hashes (FaR hashes), which can be used as an object identifier. Although the FaR hash is a single hash string, selected bits change in response to the modification of QI. On the other hand, other QIs in the object are more important for the object's identity. If these QIs change, the complete FaR hash is going to change. The calculation of FaR hash using attributes should allow third parties to generate the identifier and compare it with the current one to verify the genuineness of the object.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/19/2023

Efficient implementation of sets and multisets in R using hash tables

The package hset for the R language contains an implementation of a S4 c...
research
11/30/2017

Efficacy of Object-Based Passwords for User Authentication

Traditional text-based password schemes are inherently weak. Users tend ...
research
05/06/2021

Hashing Modulo Alpha-Equivalence

In many applications one wants to identify identical subtrees of a progr...
research
12/06/2022

Enhancing Data-Awareness of Object-Centric Event Logs

When multiple objects are involved in a process, there is an opportunity...
research
02/12/2023

Contrastive Learning and the Emergence of Attributes Associations

In response to an object presentation, supervised learning schemes gener...
research
08/21/2020

MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties

Intel Software Guard Extensions (SGX) local and remote attestation mecha...

Please sign up or login with your details

Forgot password? Click here to reset