Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes

被引:28
|
作者
Chen, Bin [1 ,2 ]
Willems, Frans M. J. [2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei, Anhui, Peoples R China
[2] Eindhoven Univ Technol, Dept Elect Engn, NL-5600 MB Eindhoven, Netherlands
基金
中国国家自然科学基金; 欧盟地平线“2020”;
关键词
Error correction codes; key generation; physical unclonable functions (PUFs); polar codes; SECURE; PERFORMANCE; ALGORITHM; PUFS;
D O I
10.1109/JIOT.2018.2864594
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources, which makes them vulnerable to physical and cloning attacks. To secure IoT devices, physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret-key generation. In this paper, we focus on designing a robust construction to derive secret keys from static random-access memory (SRAM)-PUFs, which enjoy the uniqueness and randomness properties stemming from the manufacturing variations of SRAM memory cells. We make use of a polar code construction. Based on the fact that SRAM memory can often be found in today's IoT devices, and since polar codes have been selected as error-correction technique in the fifth generation standard, this makes the proposed scheme a promising candidate for reducing the extra cost and securing resource-constrained IoT devices. In this paper, we propose a novel construction method to eliminate the effect of noise and bias in SRAM-PUFs. We shall prove that the secrecy leakage of the helper data about the secret-key can be made negligible due to polarization and proper code construction design. Results show that the proposed scheme provides a significant improvement of the reliability (achieve a failure probability below 10(-6)) and of the realizable secret-key rate, which is also evaluated by the theoretical analysis. In addition, the proposed scheme provides the possibility to tradeoff complexity, secrecy, and reliability with the same code construction for different IoT applications.
引用
收藏
页码:435 / 445
页数:11
相关论文
共 28 条
  • [21] Secret Key Generation with Signal-like Noise in Polar Coded Wireless MIMO Systems
    Zhang, Meixiang
    Jiang, Xue-Qin
    Huang, Yuting
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 204 - 206
  • [22] Disordered Mixture of Self-Assembled Molecular Functional Groups on Heterointerfaces with p-Si Leads to Multiple Key Generation in Physical Unclonable Functions
    Lee, Subin
    Kim, Hyun Ho
    Seo, Juhyung
    Jang, Byung Chul
    Yoo, Hocheon
    ACS APPLIED MATERIALS & INTERFACES, 2023, 15 (01) : 1693 - 1703
  • [23] A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function
    Wang, Yazhou
    Li, Bing
    Zhang, Yan
    Wu, Jiaxin
    Liu, Guozhu
    Li, Yuqi
    Mao, Zhen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [24] On Channel Transforms to Enhance Reciprocity and Quantization in Physical-Layer Secret Key Generation
    Hussain, Ghalib
    Junaid Nawaz, Syed
    Wyne, Shurjeel
    Patwary, Mohammad N.
    IEEE ACCESS, 2025, 13 : 256 - 272
  • [25] Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels
    Haroun, Mohamed F.
    Gulliver, T. Aaron
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1764 - 1775
  • [26] Using Power-Up SRAM State of Atmel ATmega1284P Microcontrollers as Physical Unclonable Function for Key Generation and Chip Identification
    Platonov, Mikhail
    Hlavac, Josef
    Lorencz, Robert
    INFORMATION SECURITY JOURNAL, 2013, 22 (5-6): : 244 - 250
  • [27] Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping Channels
    Xu, Peng
    Yang, Jun
    Chen, Gaojie
    Yang, Zheng
    Li, Yong
    Win, Moe Z.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 985 - 1000
  • [28] Vector partitioning quantization utilizing K-means clustering for physical layer secret key generation
    Han, Qingqing
    Liu, Jingmei
    Shen, Zhiwei
    Liu, Jingwei
    Gong, Fengkui
    INFORMATION SCIENCES, 2020, 512 : 137 - 160