How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs

被引:2
作者
Amelino, Domenico [1 ]
Barbareschi, Mario [1 ,2 ]
Battista, Ermanno [1 ,2 ]
Mazzeo, Antonino [1 ,2 ]
机构
[1] Univ Naples Federico II, DIETI Dept Elect Engn & Informat Technol, Via Claudio 21, I-80125 Naples, Italy
[2] CeRICT Scrl Ctr Reg Informat Commun Technol, Naples, Italy
来源
INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016 | 2016年 / 55卷
关键词
Wireless Sensor Network; Physically Unclonable Function; Static Random Access Memory; Reconfiguration; AUTHENTICATION;
D O I
10.1007/978-3-319-39345-2_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A wide spectrum of security challenges were arose by Wireless Sensor Network (WSN) architectures and common security techniques used in traditional networks are impractical. In particular, being the sensor nodes often deployed in unattended areas, physical attacks are possible and have to be taken into account during the architecture design. Whenever an attacker enters in possession of a node, he/she can jeopardize the network by extracting cryptographic keys used for secure communication. Moreover, an attacker can also try to brute force the keys, hence they should be fully random and hard to guess. In this paper, we propose a novel solution based on generating keys from unique physical characteristics of a node integrated circuit without requiring additional hardware compared to common WSN node architectures. To this aim, we exploit the Static Random Access Memory based Physically Unclonable Functions and we show their applicability to the WSN by implementing a working prototype based on the STM32F4 microcontroller.
引用
收藏
页码:109 / 119
页数:11
相关论文
共 22 条
[11]  
[Anonymous], ACM J EMERG TECHNOL
[12]  
Barbareschi M, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P394, DOI 10.1109/IRI.2014.7051916
[13]  
Battista Ermanno, 2013, International Journal of Critical Computer-Based Systems, V4, P374, DOI 10.1504/IJCCBS.2013.059053
[14]  
Bohm C., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P269, DOI 10.1109/ICNSS.2011.6060013
[15]   Secure distribution infrastructure for hardware digital contents [J].
Cilardo, Alessandro ;
Barbareschi, Mario ;
Mazzeo, Antonino .
IET COMPUTERS AND DIGITAL TECHNIQUES, 2014, 8 (06) :300-310
[16]  
Claes M, 2012, LECT NOTES COMPUT SC, V7161, P47, DOI 10.1007/978-3-642-29615-4_5
[17]   Toward Trusted Wireless Sensor Networks [J].
Hu, Wen ;
Tan, Hailun ;
Corke, Peter ;
Shih, Wen Chan ;
Jha, Sanjay .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2010, 7 (01)
[18]  
Lee YS, 2013, INT WIREL COMMUN, P1314, DOI 10.1109/IWCMC.2013.6583746
[19]   A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks [J].
Liu, Wenchao ;
Zhang, Zhenhua ;
Li, Miaoxin ;
Liu, Zhenglin .
SENSORS, 2014, 14 (07) :11542-11556
[20]  
Rampon Jerome, 2015, 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), P200, DOI 10.1109/ISVLSI.2015.127