A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

被引:155
作者
Shamsoshoara, Alireza [1 ]
Korenda, Ashwija [1 ]
Afghah, Fatemeh [1 ]
Zeadally, Sherali [2 ]
机构
[1] No Arizona Univ, Sch Informat Comp & Cyber Syst, Flagstaff, AZ 86011 USA
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY USA
基金
美国国家科学基金会;
关键词
Security; Hardware-based security; IoT; Physical unclonable functions (PUFs); Memory-based PUFs; Key generation; Authentication; WIRELESS SENSOR NETWORKS; DEVICE AUTHENTICATION; COLLISION ATTACKS; JAMMING ATTACKS; IOT; CHALLENGES; SYSTEMS; CRYPTOGRAPHY; ARCHITECTURE; MANAGEMENT;
D O I
10.1016/j.comnet.2020.107593
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The vast areas of applications for IoTs in future smart cities, smart transportation systems, and so on represent a thriving surface for several security attacks with economic, environmental and societal impacts. This survey paper presents a review of the security challenges of emerging IoT networks and discusses some of the attacks and their countermeasures based on different domains in IoT networks. Most conventional solutions for IoT networks are adopted from communication networks while noting the particular characteristics of IoT networks such as the nodes quantity, heterogeneity, and the limited resources of the nodes, these conventional security methods are not adequate. One challenge towards utilizing common secret key-based cryptographic methods in large-scale IoTs is the problem of secret key generation, distribution, and storage and protecting these secret keys from physical attacks. Physically unclonable functions (PUFs) can be utilized as a possible hardware remedy for identification and authentication in IoTs. Since PUFs extract the unique hardware characteristics, they potentially offer an affordable and practical solution for secret key generation. However, several barriers limit the PUFs' applications for key generation purposes. We discuss the advantages of PUF-based key generation methods, and we present a survey of state-of-the-art techniques in this domain. We also present a proof-of-concept PUF-based solution for secret key generation using resistive random-access memories (ReRAM) embedded in IoTs.
引用
收藏
页数:21
相关论文
共 50 条
[31]   Blockchain-based security aspects in heterogeneous Internet-of-Things networks: A survey [J].
Pohrmen, Fabiola Hazel ;
Das, Rohit Kumar ;
Saha, Goutam .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10)
[32]   MBM PUF: A Multi-Bit Memory-Based Physical Unclonable Function [J].
Dehghanzadeh, Peyman ;
Mandal, Soumyajit ;
Bhunia, Swarup .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2025, 72 (05) :2114-2127
[33]   A survey on security and cryptographic perspective of Industrial-Internet-of-Things [J].
Mishra, Nimish ;
Islam, S. K. Hafizul ;
Zeadally, Sherali .
INTERNET OF THINGS, 2024, 25
[34]   Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey [J].
Wu, Hui ;
Han, Haiting ;
Wang, Xiao ;
Sun, Shengli .
IEEE ACCESS, 2020, 8 (08) :153826-153848
[35]   A Survey on Standards for Interoperability and Security in the Internet of Things [J].
Lee, Euijong ;
Seo, Young-Duk ;
Oh, Se-Ra ;
Kim, Young-Gab .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (02) :1020-1047
[36]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[37]   On perspective of security and privacy-preserving solutions in the internet of things [J].
Malina, Lukas ;
Hajny, Jan ;
Fujdiak, Radek ;
Hosek, Jiri .
COMPUTER NETWORKS, 2016, 102 :83-95
[38]   Machine learning and the Internet of Things security: Solutions and open challenges [J].
Farooq, Umer ;
Tariq, Noshina ;
Asim, Muhammad ;
Baker, Thar ;
Al-Shamma'a, Ahmed .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 162 :89-104
[39]   Quantifying Security and Privacy in Internet of Things Solutions [J].
Alsubaei, Faisal ;
Abuhussein, Abdullah ;
Shiva, Sajjan .
NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
[40]   IoT Device Security: Challenging "A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function" [J].
Bendavid, Ygal ;
Bagheri, Nasour ;
Safkhani, Masoumeh ;
Rostampour, Samad .
SENSORS, 2018, 18 (12)