Protecting Private Communications in Cyber-Physical Systems through Physical Unclonable Functions

被引:12
作者
Perez-Jimenez, Marina [1 ]
Sanchez, Borja Bordel [2 ]
Migliorini, Andrea [3 ]
Alcarria, Ramon [2 ]
机构
[1] Univ Politecn Madrid, Inst Sistemas Optoelect & Microtecnol, E-28040 Madrid, Spain
[2] Univ Politecn Madrid, Dept Geospatial Engn, Madrid 28031, Spain
[3] Max Planck Inst Microstruct Phys, D-06120 Halle, Germany
关键词
cyber-physical systems; physical unclonable functions; streaming communications; security; encryption; EXCHANGE BIAS; SECURITY; ROBUST;
D O I
10.3390/electronics8040390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPS) are envisioned to change the whole of society. New engineered systems joining physical and digital solutions are being employed in industry, education, etc. These new systems are networked by default, and private information is shared among the different components related to users, critical infrastructures, or business operations. In this context, it is essential to encrypt those communication links to protect such information. However, even most complicated schemes based on hybrid (asymmetric and symmetric) solutions, finally require physical devices to store a secret key. This approach is cryptographically weak, as any person with physical access to the device could obtain that key. Therefore, in this paper we propose the use of physical unclonable functions (PUF) to generate secret keys for lightweight encryption schemes. Using PUFs, any attempt to capture the key is changing the original secret stream, and even manufacturers are not able to build two identical PUFs. The proposed key generator is based on magnetic materials and lightweight pseudorandom number generators to meet the low-cost and small size requirements of CPS. In particular, materials with an activated exchange-bias effect are employed, together with simple copper coils. The encryption process can be based on a simple XOR gate because of the robustness of the proposed key generator. In order to evaluate the performance of the proposed technology, an experimental validation based on simulation scenarios is also provided.
引用
收藏
页数:22
相关论文
共 48 条
[1]  
[Anonymous], 2001, NIST SPECIAL PUBLICA, V800-38A
[2]   Chaos-based communications at high bit rates using commercial fibre-optic links [J].
Argyris, A ;
Syvridis, D ;
Larger, L ;
Annovazzi-Lodi, V ;
Colet, P ;
Fischer, I ;
García-Ojalvo, J ;
Mirasso, CR ;
Pesquera, L ;
Shore, KA .
NATURE, 2005, 438 (7066) :343-346
[3]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[4]  
Bohm C., 2013, Physical Unclonable Functions in Theory and Practice
[5]   Stochastic and Information Theory Techniques to Reduce Large Datasets and Detect Cyberattacks in Ambient Intelligence Environments [J].
Bordel, Borja ;
Alcarria, Ramon ;
Robles, Tomas ;
Sanchez-Picot, Alvaro .
IEEE ACCESS, 2018, 6 :34896-34910
[6]   An Intra-Slice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators [J].
Bordel, Borja ;
Beatriz Orue, Amaliya ;
Alcarria, Ramon ;
Sanchez-de-Rivera, Diego .
IEEE ACCESS, 2018, 6 :16149-16164
[7]   Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks [J].
Bordel, Borja ;
Alcarria, Ramon ;
Sanchez-de-Rivera, Diego ;
Robles, Tomas .
UBIQUITOUS COMPUTING AND AMBIENT INTELLIGENCE, UCAMI 2017, 2017, 10586 :161-171
[8]   Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things [J].
Bordel, Borja ;
Alcarria, Ramon ;
Robles, Tomas ;
Martin, Diego .
PERVASIVE AND MOBILE COMPUTING, 2017, 40 :156-184
[9]  
Borden B, 2017, IOP CONCISE PHYS, P1, DOI 10.1088/978-1-6817-4485-8
[10]  
Buchanan WJ., 2017, J CYBER SECUR TECHNO, V1, P187, DOI [DOI 10.1080/23742917.2017.1384917, 10.1080/23742917.2017.1384917]