SRAM-PUF-Based Entities Authentication Scheme for Resource-Constrained IoT Devices

被引:58
作者
Farha, Fadi [1 ]
Ning, Huansheng [1 ]
Ali, Karim [1 ]
Chen, Liming [2 ]
Nugent, Christopher [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Ulster Univ Jordanstown, Sch Comp, Newtownabbey BT37 0QB, North Ireland
基金
中国国家自然科学基金;
关键词
Authentication; SRAM cells; Internet of Things; Physical unclonable function; Logic gates; Thermal stability; Entity authentication; physical security; static random access memory (SRAM)-physical unclonable {function (PUF)}; UNCLONABLE FUNCTIONS; SECURITY; INTERNET;
D O I
10.1109/JIOT.2020.3032518
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the cloud-based Internet of Things (IoT), people and things can request services, access data, or control actuators located thousands of miles away. The entity authentication of the remotely accessed devices is an essential part of the security systems. In this vein, physical unclonable functions (PUFs) are a hot research topic, especially for generating random, stable, and tamper-resistant fingerprints. This article proposes a lightweight, robust static random access memory (SRAM)-PUF-based entity authentication scheme to guarantee that the accessed end devices are trustable. The proposed scheme uses challenge-response pairs (CRPs) represented by reordered memory addresses as challenges and the corresponding SRAM cells' startup values as responses. The experimental results show that our scheme can efficiently authenticate resources-constrained IoT devices with a low computation overhead and small memory capacity. Furthermore, we analyze the SRAM-PUF by testing the PUF output under different environmental conditions, including temperature and magnetic field, in addition to exploring the effect of writing different values to the SRAM cells on the stability of their startup values.
引用
收藏
页码:5904 / 5913
页数:10
相关论文
共 30 条
[1]   Mutual Authentication in IoT Systems Using Physical Unclonable Functions [J].
Aman, Muhammad Naveed ;
Chua, Kee Chaing ;
Sikdar, Biplab .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1327-1340
[2]  
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[3]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[4]  
Boyd C., 2020, AUTHENTICATION KEY T, P135
[5]   PUF Based Authentication Protocol for IoT [J].
Braeken, An .
SYMMETRY-BASEL, 2018, 10 (08)
[6]  
Che W., 2017, CRYPTOGR, V1, P3, DOI DOI 10.3390/CRYPTOGRAPHY1010003
[7]   Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT [J].
Chen, Yaxing ;
Sun, Wenhai ;
Zhang, Ning ;
Zheng, Qinghua ;
Lou, Wenjing ;
Hou, Y. Thomas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) :1830-1842
[8]   Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis [J].
Delvaux, Jeroen ;
Gu, Dawu ;
Schellekens, Dries ;
Verbauwhede, Ingrid .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (06) :889-902
[9]   IoT Connectivity Technologies and Applications: A Survey [J].
Ding, Jie ;
Nemati, Mahyar ;
Ranaweera, Chathurika ;
Choi, Jinho .
IEEE ACCESS, 2020, 8 :67646-67673
[10]   Physical unclonable functions based secret keys scheme for securing big data infrastructure communication [J].
Farha, Fadi ;
Ning, Huansheng ;
Liu, Hong ;
Yang, Laurence T. ;
Chen, Liming .
INFORMATION SCIENCES, 2019, 503 :307-318