Proof of Concept for IoT Device Authentication based on SRAM PUFs using ATMEGA 2560-MCU

被引:13
作者
Lipps, Christoph [1 ]
Weinand, Andreas [2 ]
Krummacker, Dennis [1 ]
Fischer, Christoph [1 ]
Schotten, Hans D. [1 ,2 ]
机构
[1] German Res Ctr Artificial Intelligence, Berlin, Germany
[2] Univ Kaiserslautern, Inst Wireless Commun & Nav, Kaiserslautern, Germany
来源
2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018) | 2018年
关键词
PUF; IoT; SRAM; security; authentication; identification; cryptography; unclonability;
D O I
10.1109/ICDIS.2018.00013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The continuously rising amount of interconnected devices leads to many new attack vectors and cyber security threats. Secure and authentic communication is one of the fundamental needs of progress and development of new technologies. Therefore, new methods to verify the identity of participants in communication processes must be developed. We suggest different approaches for SRAM-based Physically Unclonable Function (PUF) deployment, such as Internet of Things (IoT)-device authentication or symmetric key cryptography (SKC). To obtain a reliable statement about the quality of the derived PUF, we applied some commonly used metrics like the entropy and correlated them with exterior influencing factors such as the environmental temperature or the supply voltage. We further show, that our approach and the examined parameters, provide a secure and reliable communication, based on a confidential, resource efficient and low-cost authentication method for IoT-devices which is enabled by usage of already given components, such as ATMEGA 2560 MCU internal SRAM-cells.
引用
收藏
页码:36 / 42
页数:7
相关论文
共 20 条
  • [1] Arora N., 1992, IEEE T ELECTRON DEV, P292
  • [2] Beckmann N, 2009, LECT NOTES COMPUT SC, V5806, P206, DOI 10.1007/978-3-642-04431-1_15
  • [3] Bohm C., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P269, DOI 10.1109/ICNSS.2011.6060013
  • [4] Bojanova I., 2013, INFORM DEV
  • [5] Ferguson N., CRYPTOGRAPHY ENG DES
  • [6] Filanovsky I., 2001, IEEE T CIRCUITS SYST, P879
  • [7] Controlled Physical Random Functions
    Gassend, B
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 149 - 160
  • [8] Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
  • [9] Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers
    Holcomb, Daniel E.
    Burleson, Wayne P.
    Fu, Kevin
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (09) : 1198 - 1210
  • [10] Koeberl Patrick, 2012, Trusted Systems. Third International Conference INTRUST 2011. Revised Selected Papers, P271, DOI 10.1007/978-3-642-32298-3_18