On the Adoption of Physically Unclonable Functions to Secure IIoT Devices

被引:19
作者
Barbareschi, Mario [1 ]
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Montagna, Erasmo La [1 ]
Mazzocca, Nicola [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Industrial Internet of Things; Security; Authentication; Computer architecture; Encryption; Informatics; Hardware; Industrial Internet of Things (IIoT) security; Internet of Things (IoT) device security; physically unclonable functions (PUFs);
D O I
10.1109/TII.2021.3059656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing convergence among information and operation technology worlds in modern Industrial Internet of Things (IIoT) systems is posing new security challenges, requiring the adoption of novel security mechanisms involving light architectures and protocols to cope with IIoT devices resource constraints. In this article, we investigate the adoption of physically unclonable functions (PUFs) in the IIoT context, and propose the design of a PUF-based architecture (Pseudo-PUF), obtained by suitably combining a weak PUF and an encryption module, that can be successfully adopted to implement advanced security primitives while meeting the existing requirements of IIoT devices in terms of cost and resource demand. To demonstrate the feasibility of our proposal, we analyzed the overall quality of different Pseudo-PUF instances with respect to well-known PUF quality metrics, and found that it is possible to obtain good results with a negligible impact on the devices, thus making our approach suited to IIoT deployments.
引用
收藏
页码:7781 / 7790
页数:10
相关论文
共 31 条
[21]  
Maiti Abhranil, 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P94, DOI 10.1109/HST.2010.5513108
[22]   Application Study of Hardware-Based Security for Future Industrial IoT [J].
Matischek, Rainer ;
Bara, Benjamin .
2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, :246-252
[23]   A PUF taxonomy [J].
McGrath, Thomas ;
Bagci, Ibrahim E. ;
Wang, Zhiming M. ;
Roedig, Utz ;
Young, Robert J. .
APPLIED PHYSICS REVIEWS, 2019, 6 (01)
[24]  
Meng-Day Mandel Yu, 2012, Proceedings 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2012), P108, DOI 10.1109/HST.2012.6224329
[25]   Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations [J].
Neshenko, Nataliia ;
Bou-Harb, Elias ;
Crichigno, Jorge ;
Kaddoum, Georges ;
Ghani, Nasir .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2702-2733
[26]  
Panchal AC, 2018, IEEE GLOB CONF WIREL, P124, DOI 10.1109/GCWCN.2018.8668630
[27]   Physical one-way functions [J].
Pappu, R ;
Recht, R ;
Taylor, J ;
Gershenfeld, N .
SCIENCE, 2002, 297 (5589) :2026-2030
[28]  
Santiago L, 2017, INT SYM DEFEC FAU TO, P29
[29]   A survey on physical unclonable function (PUF)-based security solutions for Internet of Things [J].
Shamsoshoara, Alireza ;
Korenda, Ashwija ;
Afghah, Fatemeh ;
Zeadally, Sherali .
COMPUTER NETWORKS, 2020, 183
[30]   A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities [J].
Tange, Koen ;
De Donno, Michele ;
Fafoutis, Xenofon ;
Dragoni, Nicola .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04) :2489-2520