How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs

被引:2
作者
Amelino, Domenico [1 ]
Barbareschi, Mario [1 ,2 ]
Battista, Ermanno [1 ,2 ]
Mazzeo, Antonino [1 ,2 ]
机构
[1] Univ Naples Federico II, DIETI Dept Elect Engn & Informat Technol, Via Claudio 21, I-80125 Naples, Italy
[2] CeRICT Scrl Ctr Reg Informat Commun Technol, Naples, Italy
来源
INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016 | 2016年 / 55卷
关键词
Wireless Sensor Network; Physically Unclonable Function; Static Random Access Memory; Reconfiguration; AUTHENTICATION;
D O I
10.1007/978-3-319-39345-2_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A wide spectrum of security challenges were arose by Wireless Sensor Network (WSN) architectures and common security techniques used in traditional networks are impractical. In particular, being the sensor nodes often deployed in unattended areas, physical attacks are possible and have to be taken into account during the architecture design. Whenever an attacker enters in possession of a node, he/she can jeopardize the network by extracting cryptographic keys used for secure communication. Moreover, an attacker can also try to brute force the keys, hence they should be fully random and hard to guess. In this paper, we propose a novel solution based on generating keys from unique physical characteristics of a node integrated circuit without requiring additional hardware compared to common WSN node architectures. To this aim, we exploit the Static Random Access Memory based Physically Unclonable Functions and we show their applicability to the WSN by implementing a working prototype based on the STM32F4 microcontroller.
引用
收藏
页码:109 / 119
页数:11
相关论文
共 22 条
[1]  
Albanese M, 2014, IEEE CONF COMM NETW, P472, DOI 10.1109/CNS.2014.6997517
[2]   Exploiting Cloud Technologies and Context Information for Recommending Touristic Paths [J].
Amato, Flora ;
Mazzeo, Antonino ;
Moscato, Vincenzo ;
Picariello, Antonio .
INTELLIGENT DISTRIBUTED COMPUTING VII, 2014, 511 :281-287
[3]  
Amato F, 2012, PROCEEDINGS OF THE TWELFTH INTERNATIONAL WORKSHOP ON WEB INFORMATION AND DATA MANAGEMENT, P49
[4]  
Anderson JH, 2010, ASIA S PACIF DES AUT, P1, DOI 10.1109/ASPDAC.2010.5419927
[5]  
[Anonymous], 2015, P 10 INT C DES TECHN
[6]  
[Anonymous], 2015, P 52 ANN DES AUT C
[7]  
[Anonymous], P BEN INF SYST SEC E
[8]  
[Anonymous], 1997, Handbook of Applied Cryptography
[9]  
[Anonymous], RM0090 REF MAN 10
[10]  
[Anonymous], 2007, FPGA INTRINSIC PUFS