Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes

被引:28
|
作者
Chen, Bin [1 ,2 ]
Willems, Frans M. J. [2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei, Anhui, Peoples R China
[2] Eindhoven Univ Technol, Dept Elect Engn, NL-5600 MB Eindhoven, Netherlands
基金
中国国家自然科学基金; 欧盟地平线“2020”;
关键词
Error correction codes; key generation; physical unclonable functions (PUFs); polar codes; SECURE; PERFORMANCE; ALGORITHM; PUFS;
D O I
10.1109/JIOT.2018.2864594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources, which makes them vulnerable to physical and cloning attacks. To secure IoT devices, physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret-key generation. In this paper, we focus on designing a robust construction to derive secret keys from static random-access memory (SRAM)-PUFs, which enjoy the uniqueness and randomness properties stemming from the manufacturing variations of SRAM memory cells. We make use of a polar code construction. Based on the fact that SRAM memory can often be found in today's IoT devices, and since polar codes have been selected as error-correction technique in the fifth generation standard, this makes the proposed scheme a promising candidate for reducing the extra cost and securing resource-constrained IoT devices. In this paper, we propose a novel construction method to eliminate the effect of noise and bias in SRAM-PUFs. We shall prove that the secrecy leakage of the helper data about the secret-key can be made negligible due to polarization and proper code construction design. Results show that the proposed scheme provides a significant improvement of the reliability (achieve a failure probability below 10(-6)) and of the realizable secret-key rate, which is also evaluated by the theoretical analysis. In addition, the proposed scheme provides the possibility to tradeoff complexity, secrecy, and reliability with the same code construction for different IoT applications.
引用
收藏
页码:435 / 445
页数:11
相关论文
共 28 条
  • [1] A Secure and Robust Key Generation Method Using Physical Unclonable Functions and Polar Codes
    Bai, Yonghong
    Yan, Zhiyuan
    PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS 2019), 2019, : 254 - 259
  • [2] An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
    Guenlue, Onur
    Schaefer, Rafael F.
    ENTROPY, 2021, 23 (01) : 1 - 23
  • [3] Physical Unclonable Functions with Improved Robustness Based on Polar Codes
    Bai, Yonghong
    Yan, Zhiyuan
    2017 IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS), 2017,
  • [4] A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions
    Korenda, Ashwija Reddy
    Afghah, Fatemeh
    Cambou, Bertrand
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 1261 - 1266
  • [5] Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel
    Hooshmand, R.
    Shooshtari, M. Koochak
    Aref, M. R.
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [6] Secret Key Generation Using Short Blocklength Polar Coding Over Wireless Channels
    Hentila, Henri
    Shkel, Yanina Y.
    Koivunen, Visa
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2022, 16 (01) : 144 - 157
  • [7] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 6213 - 6237
  • [8] Secret Key Cryptosystem Based on Non-systematic Polar Codes
    Reza Hooshmand
    Mohammad Reza Aref
    Taraneh Eghlidos
    Wireless Personal Communications, 2015, 84 : 1345 - 1373
  • [9] Secret Key Cryptosystem Based on Non-systematic Polar Codes
    Hooshmand, Reza
    Aref, Mohammad Reza
    Eghlidos, Taraneh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) : 1345 - 1373
  • [10] SECRET KEY GENERATION OVER WIRELESS CHANNELS USING SHORT BLOCKLENGTH MULTILEVEL SOURCE POLAR CODING
    Hentila, Henri
    Shkel, Yanina Y.
    Koivunen, Visa
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2615 - 2619