{"id":"https://openalex.org/W2910921295","doi":"https://doi.org/10.1109/dft.2018.8602986","title":"Fast Dynamic Device Authentication Based on Lorenz Chaotic Systems","display_name":"Fast Dynamic Device Authentication Based on Lorenz Chaotic Systems","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2910921295","doi":"https://doi.org/10.1109/dft.2018.8602986","mag":"2910921295"},"language":"en","primary_location":{"id":"doi:10.1109/dft.2018.8602986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2018.8602986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021505206","display_name":"Lake Bu","orcid":"https://orcid.org/0000-0002-9450-6533"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lake Bu","raw_affiliation_strings":["Adaptive & Secure Comput. Syst. Lab., Boston University, Boston, MA, US"],"affiliations":[{"raw_affiliation_string":"Adaptive & Secure Comput. Syst. Lab., Boston University, Boston, MA, US","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047482490","display_name":"Hai Cheng","orcid":"https://orcid.org/0000-0002-6082-8139"},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Cheng","raw_affiliation_strings":["Department of Electronic Engineering, Heilongjiang University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Heilongjiang University, Harbin, China","institution_ids":["https://openalex.org/I55022517"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069200437","display_name":"Michel A. Kinsy","orcid":"https://orcid.org/0000-0002-1432-6939"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michel A. Kinsy","raw_affiliation_strings":["Adaptive and Secure Computing Systems Laboratory, Boston University, Boston, MA, USA"],"affiliations":[{"raw_affiliation_string":"Adaptive and Secure Computing Systems Laboratory, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5021505206"],"corresponding_institution_ids":["https://openalex.org/I111088046"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17109252,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"120","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7484744191169739},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.678970456123352},{"id":"https://openalex.org/keywords/lorenz-system","display_name":"Lorenz system","score":0.522659957408905},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48553466796875},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47080859541893005},{"id":"https://openalex.org/keywords/divergence","display_name":"Divergence (linguistics)","score":0.46773749589920044},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.4492831528186798},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.43540889024734497},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.347723126411438},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20844632387161255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15011435747146606},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08539888262748718}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7484744191169739},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.678970456123352},{"id":"https://openalex.org/C151510863","wikidata":"https://www.wikidata.org/wiki/Q899844","display_name":"Lorenz system","level":3,"score":0.522659957408905},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48553466796875},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47080859541893005},{"id":"https://openalex.org/C207390915","wikidata":"https://www.wikidata.org/wiki/Q1230525","display_name":"Divergence (linguistics)","level":2,"score":0.46773749589920044},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.4492831528186798},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.43540889024734497},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.347723126411438},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20844632387161255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15011435747146606},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08539888262748718},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dft.2018.8602986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft.2018.8602986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1517403092","https://openalex.org/W1750253748","https://openalex.org/W2000171858","https://openalex.org/W2003545651","https://openalex.org/W2033628417","https://openalex.org/W2065245578","https://openalex.org/W2068844879","https://openalex.org/W2081223177","https://openalex.org/W2082425750","https://openalex.org/W2120706888","https://openalex.org/W2122363357","https://openalex.org/W2134755853","https://openalex.org/W2762673474","https://openalex.org/W2791172426","https://openalex.org/W3004086051","https://openalex.org/W4303090068","https://openalex.org/W6749197591"],"related_works":["https://openalex.org/W2372129196","https://openalex.org/W2376048186","https://openalex.org/W4383955238","https://openalex.org/W1890102852","https://openalex.org/W2149205801","https://openalex.org/W4386858665","https://openalex.org/W2371307312","https://openalex.org/W2390700585","https://openalex.org/W3014044074","https://openalex.org/W1996785905"],"abstract_inverted_index":{"Chaotic":[0],"systems,":[1],"such":[2,169],"as":[3,170],"Lorenz":[4,103,125],"systems":[5,41,52,69],"or":[6],"logistic":[7],"functions,":[8],"are":[9,53,144],"known":[10,78],"for":[11,146,153],"their":[12],"rapid":[13],"divergence":[14,49,97],"property.":[15],"Even":[16],"the":[17,21,33,96,102,106,131,136,139,159,178,197,208],"smallest":[18],"change":[19],"in":[20,56,60,135,165,203,212],"initial":[22],"condition":[23],"will":[24],"lead":[25],"to":[26,44,118,149,156,183,195],"vastly":[27],"different":[28],"outputs.":[29],"This":[30],"property":[31],"renders":[32],"short-term":[34],"behavior,":[35],"i.e.,":[36],"output":[37,142],"values,":[38],"of":[39,47,101,122,130,199,214],"these":[40,67],"very":[42,210],"hard":[43,145],"predict.":[45],"Because":[46],"this":[48,83],"feature,":[50],"lorenz":[51],"often":[54],"used":[55],"cryptographic":[57],"applications,":[58],"particularly":[59],"key":[61],"agreement":[62],"protocols":[63],"and":[64,98,217],"encryptions.":[65],"Yet,":[66],"chaotic":[68,126,201],"do":[70],"exhibit":[71],"long-term":[72],"deterministic":[73],"behaviors-i.e.,":[74],"fit":[75],"into":[76],"a":[77,87,108,119,123,154,166,171,185],"shape":[79],"over":[80],"time.":[81,190],"In":[82,105,163],"work,":[84],"we":[85],"propose":[86],"fast":[88],"dynamic":[89],"device":[90,109,179],"authentication":[91,115,187],"scheme":[92],"that":[93,138],"leverages":[94],"both":[95],"convergence":[99],"features":[100],"systems.":[104],"scheme,":[107],"proves":[110],"its":[111,200],"legitimacy":[112],"by":[113],"showing":[114],"tags":[116],"belonging":[117],"predetermined":[120],"trajectory":[121],"given":[124],"system.":[127],"The":[128],"security":[129],"proposed":[132],"technique":[133],"resides":[134],"fact":[137],"short-range":[140],"function":[141,160],"values":[143],"an":[147,204],"attacker":[148],"predict,":[150],"but":[151],"easy":[152],"verifier":[155],"validate":[157],"because":[158],"is":[161],"deterministic.":[162],"addition,":[164],"multi-verifier":[167],"scenario":[168],"mobile":[172],"phone":[173],"switching":[174],"among":[175],"base":[176],"stations,":[177],"does":[180],"not":[181],"have":[182],"re-initiate":[184],"separate":[186],"procedure":[188,209],"each":[189],"Instead,":[191],"it":[192],"just":[193],"needs":[194],"prove":[196],"consistency":[198],"behavior":[202],"iterative":[205],"manner,":[206],"making":[207],"efficient":[211],"terms":[213],"execution":[215],"time":[216],"computing":[218],"resources.":[219]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
