A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

被引:138
|
作者
Shamsoshoara, Alireza [1 ]
Korenda, Ashwija [1 ]
Afghah, Fatemeh [1 ]
Zeadally, Sherali [2 ]
机构
[1] No Arizona Univ, Sch Informat Comp & Cyber Syst, Flagstaff, AZ 86011 USA
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY USA
基金
美国国家科学基金会;
关键词
Security; Hardware-based security; IoT; Physical unclonable functions (PUFs); Memory-based PUFs; Key generation; Authentication; WIRELESS SENSOR NETWORKS; DEVICE AUTHENTICATION; COLLISION ATTACKS; JAMMING ATTACKS; IOT; CHALLENGES; SYSTEMS; CRYPTOGRAPHY; ARCHITECTURE; MANAGEMENT;
D O I
10.1016/j.comnet.2020.107593
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The vast areas of applications for IoTs in future smart cities, smart transportation systems, and so on represent a thriving surface for several security attacks with economic, environmental and societal impacts. This survey paper presents a review of the security challenges of emerging IoT networks and discusses some of the attacks and their countermeasures based on different domains in IoT networks. Most conventional solutions for IoT networks are adopted from communication networks while noting the particular characteristics of IoT networks such as the nodes quantity, heterogeneity, and the limited resources of the nodes, these conventional security methods are not adequate. One challenge towards utilizing common secret key-based cryptographic methods in large-scale IoTs is the problem of secret key generation, distribution, and storage and protecting these secret keys from physical attacks. Physically unclonable functions (PUFs) can be utilized as a possible hardware remedy for identification and authentication in IoTs. Since PUFs extract the unique hardware characteristics, they potentially offer an affordable and practical solution for secret key generation. However, several barriers limit the PUFs' applications for key generation purposes. We discuss the advantages of PUF-based key generation methods, and we present a survey of state-of-the-art techniques in this domain. We also present a proof-of-concept PUF-based solution for secret key generation using resistive random-access memories (ReRAM) embedded in IoTs.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Overview of PUF-Based Hardware Security Solutions for the Internet of Things
    Halak, Basel
    Zwolinski, Mark
    Mispan, M. Syafiq
    2016 IEEE 59TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2016, : 425 - 428
  • [2] A Review-Hardware Security Using PUF (Physical Unclonable Function)
    Sakhare, Shruti
    Sakhare, Dipti
    ICCCE 2019: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND CYBER-PHYSICAL ENGINEERING, 2020, 570 : 373 - 377
  • [3] Internet of Things: Security and Solutions Survey
    Sadhu, Pintu Kumar
    Yanambaka, Venkata P.
    Abdelgawad, Ahmed
    SENSORS, 2022, 22 (19)
  • [4] Physically Unclonable Function: a Promising Security Primitive for Internet of Things
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Phuong Ha Nguyen
    Sahoo, Durga Prasad
    2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID), 2015, : 14 - 15
  • [5] Using Physically Unclonable Function for Increasing Security of Internet of Things
    Khaje, Mohammad Taghi Fatehi
    Moradi, Mona
    Navi, Kivan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED CYBER SECURITY (ACS) 2021, 2022, 378 : 81 - 89
  • [6] Physical Unclonable Function Based Authentication Scheme for Smart Devices in Internet of Things
    Mughal, Muhammad Arif
    Luo, Xiong
    Mahmood, Zahid
    Ullah, Ata
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART INTERNET OF THINGS (SMARTIOT 2018), 2018, : 160 - 165
  • [7] Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
    Aseeri, Ahmad O.
    Chauhdary, Sajjad Hussain
    Alkatheiri, Mohammed Saeed
    Alqarni, Mohammed A.
    Zhuang, Yu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (01): : 1901 - 1918
  • [8] Lightweight Security for the Internet of Things: A Soft Introduction to Physical Unclonable Functions
    Schinianakis D.
    IEEE Potentials, 2019, 38 (02): : 21 - 28
  • [9] Device authentication with FPGA based self correcting Physical Unclonable Function for Internet of Things
    Agarwal, Shreesh Kumar
    Joshi, Amit M.
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 95
  • [10] Machine learning based solutions for security of Internet of Things (IoT): A survey
    Tahsien, Syeda Manjia
    Karimipour, Hadis
    Spachos, Petros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161