Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges

被引:0
作者
Marastoni, Niccolo [1 ]
Ceccato, Mariano [1 ]
机构
[1] Univ Verona, Verona, Italy
来源
PROCEEDINGS OF THE 5TH WORKSHOP ON CPS & IOT SECURITY AND PRIVACY, CPSIOTSEC 2023 | 2023年
关键词
IoT; security; remote attestation; PUF; SOK; SOFTWARE-BASED ATTESTATION; AUTHENTICATION; PROTOCOL; THINGS; PUF;
D O I
10.1145/3605758.3623502
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the past few years, the diffusion of IoT devices used in everyday life has skyrocketed. From wearable devices to smart home appliances, these gadgets are increasingly exposed to the Internet or to open networks. This means that it is necessary to find security solutions that can guarantee the safety of these devices, while at the same time saving on energy consumption and implementation space. In this paper we explore recent works that use remote attestation as a possible solution to the security of IoT devices while also focusing on the use of Physically Unclonable Functions (PUFs). We provide a thorough analysis of the selected papers, providing insights on possible future research directions.
引用
收藏
页码:25 / 36
页数:12
相关论文
共 44 条
  • [11] Casimier Joseph Franciscus Cremers, 2006, SCYTHER SEMANTICS VE
  • [12] Cervesato I., 2001, P 16 ANN S LOG COMP, V1, P1
  • [13] Chen S, 2005, USENIX Association Proceedings of the 14th USENIX Security Symposium, P177
  • [14] LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
    Dessouky, Ghada
    Abera, Tigist
    Ibrahim, Ahmad
    Sadeghi, Ahmad-Reza
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [15] AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
    Feng, Wei
    Qin, Yu
    Zhao, Shijun
    Feng, Dengguo
    [J]. COMPUTER NETWORKS, 2018, 134 : 167 - 182
  • [16] Garg A, 2014, IEEE INT SYMP CIRC S, P1941, DOI 10.1109/ISCAS.2014.6865541
  • [17] Ghaeini HR, 2019, PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, P165
  • [18] Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF
    Govindaraj, Rekha
    Ghosh, Swaroop
    Katkoori, Srinivas
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1232 - 1242
  • [19] A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks
    Guizani, Nadra
    Ghafoor, Arif
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1218 - 1228
  • [20] Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
    Herder, Charles
    Ren, Ling
    van Dijk, Marten
    Yu, Meng-Day
    Devadas, Srinivas
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (01) : 65 - 82