On the Adoption of Physically Unclonable Functions to Secure IIoT Devices

被引:19
作者
Barbareschi, Mario [1 ]
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Montagna, Erasmo La [1 ]
Mazzocca, Nicola [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Industrial Internet of Things; Security; Authentication; Computer architecture; Encryption; Informatics; Hardware; Industrial Internet of Things (IIoT) security; Internet of Things (IoT) device security; physically unclonable functions (PUFs);
D O I
10.1109/TII.2021.3059656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing convergence among information and operation technology worlds in modern Industrial Internet of Things (IIoT) systems is posing new security challenges, requiring the adoption of novel security mechanisms involving light architectures and protocols to cope with IIoT devices resource constraints. In this article, we investigate the adoption of physically unclonable functions (PUFs) in the IIoT context, and propose the design of a PUF-based architecture (Pseudo-PUF), obtained by suitably combining a weak PUF and an encryption module, that can be successfully adopted to implement advanced security primitives while meeting the existing requirements of IIoT devices in terms of cost and resource demand. To demonstrate the feasibility of our proposal, we analyzed the overall quality of different Pseudo-PUF instances with respect to well-known PUF quality metrics, and found that it is possible to obtain good results with a negligible impact on the devices, thus making our approach suited to IIoT deployments.
引用
收藏
页码:7781 / 7790
页数:10
相关论文
共 31 条
[1]  
Anagnostopoulos N. A., 2019, PROC IEEE INT C CONS, P1
[2]  
Anderson JH, 2010, ASIA S PACIF DES AUT, P1, DOI 10.1109/ASPDAC.2010.5419927
[3]  
Barbareschi M., 2017, Notions on Silicon Physically Unclonable Functions, P189, DOI DOI 10.1007/978-3-319-44318-8_10
[4]   A PUF-based mutual authentication scheme for Cloud-Edges IoT systems [J].
Barbareschi, Mario ;
De Benedictis, Alessandra ;
La Montagna, Erasmo ;
Mazzeo, Antonino ;
Mazzocca, Nicola .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :246-261
[5]   Designing an SRAM PUF-based secret extractor for resource-constrained devices [J].
Barbareschi, Mario ;
Bagnasco, Pierpaolo ;
Amelino, Domenico ;
Mazzeo, Antonino .
International Journal of Embedded Systems, 2017, 9 (04) :353-364
[6]  
Barbarisi M., 2019, PHYTOTHER RES, P1
[7]  
Bhargava M, 2014, DES AUT TEST EUROPE
[8]   Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database [J].
Chatterjee, Urbi ;
Govindan, Vidya ;
Sadhukhan, Rajat ;
Mukhopadhyay, Debdeep ;
Chakraborty, Rajat Subhra ;
Mahata, Debashis ;
Prabhu, Mukesh M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) :424-437
[9]   Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities [J].
Choo, Kim-Kwang Raymond ;
Gritzalis, Stefanos ;
Park, Jong Hyuk .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3567-3569
[10]  
Dinu D.-D., 2015, P NIST WORKSH LIGHT P NIST WORKSH LIGHT