On the Adoption of Physically Unclonable Functions to Secure IIoT Devices

被引:18
作者
Barbareschi, Mario [1 ]
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Montagna, Erasmo La [1 ]
Mazzocca, Nicola [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Industrial Internet of Things; Security; Authentication; Computer architecture; Encryption; Informatics; Hardware; Industrial Internet of Things (IIoT) security; Internet of Things (IoT) device security; physically unclonable functions (PUFs);
D O I
10.1109/TII.2021.3059656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing convergence among information and operation technology worlds in modern Industrial Internet of Things (IIoT) systems is posing new security challenges, requiring the adoption of novel security mechanisms involving light architectures and protocols to cope with IIoT devices resource constraints. In this article, we investigate the adoption of physically unclonable functions (PUFs) in the IIoT context, and propose the design of a PUF-based architecture (Pseudo-PUF), obtained by suitably combining a weak PUF and an encryption module, that can be successfully adopted to implement advanced security primitives while meeting the existing requirements of IIoT devices in terms of cost and resource demand. To demonstrate the feasibility of our proposal, we analyzed the overall quality of different Pseudo-PUF instances with respect to well-known PUF quality metrics, and found that it is possible to obtain good results with a negligible impact on the devices, thus making our approach suited to IIoT deployments.
引用
收藏
页码:7781 / 7790
页数:10
相关论文
共 50 条
[31]   A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [J].
Kardas, Suleyman ;
Kiraz, Mehmet Sabir ;
Bingol, Muhammed Ali ;
Demirci, Huseyin .
RFID SECURITY AND PRIVACY, 2012, 7055 :78-93
[32]   Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions [J].
Armknecht, Frederik ;
Maes, Roel ;
Sadeghi, Ahmad-Reza ;
Sunar, Berk ;
Tuyls, Pim .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 :685-+
[33]   Experimental studies of plasmonics-enhanced optical physically unclonable functions [J].
Villegas, Juan Esteban ;
Paredes, Bruna ;
Rasras, Mahmoud .
OPTICS EXPRESS, 2021, 29 (20) :32020-32030
[34]   Model Building Attacks on Physically Unclonable Functions using Genetic Programming [J].
Saha, Indrasish ;
Jeldi, Ratan Rahul ;
Chakraborty, Rajat Subhra .
2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, :41-44
[35]   Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions [J].
Maes, Roel ;
Verbauwhede, Ingrid .
TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, :3-37
[36]   Twin physically unclonable functions based on aligned carbon nanotube arrays [J].
Zhong, Donglai ;
Liu, Jingxia ;
Xiao, Mengmeng ;
Xie, Yunong ;
Shi, Huiwen ;
Liu, Lijun ;
Zhao, Chenyi ;
Ding, Li ;
Peng, Lian-Mao ;
Zhang, Zhiyong .
NATURE ELECTRONICS, 2022, 5 (07) :424-432
[37]   Correction of Bit-Aliasing in Memristor-Based Physically Unclonable Functions With Timing Variability [J].
Nguyen, Ha-Phuong ;
Nguyen, The-Nghia ;
Seo, Yeong-Seok ;
Hwang, Dosam ;
Shin, Donghwa .
IEEE ACCESS, 2019, 7 :135312-135321
[38]   A Robust Authentication Protocol for Wireless Medical Sensor Networks Using Blockchain and Physically Unclonable Functions [J].
Yu, Sungjin ;
Park, Youngho .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) :20214-20228
[39]   A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [J].
Kardas, Suleyman ;
Kiraz, Mehmet Sabir ;
Bingol, Muhammed Ali ;
Demirci, Huseyin .
RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 :78-93
[40]   Hybrid Silicon CMOS-Carbon Nanotube Physically Unclonable Functions [J].
Armstrong, Darren ;
Nasri, Bayan ;
Karri, Ramesh ;
Shahrjerdi, Davood .
2017 IEEE SOI-3D-SUBTHRESHOLD MICROELECTRONICS TECHNOLOGY UNIFIED CONFERENCE (S3S), 2017,