Physical unclonable functions based secret keys scheme for securing big data infrastructure communication

被引:8
作者
Farha, Fadi [1 ]
Ning, Huansheng [1 ]
Liu, Hong [2 ]
Yang, Laurence T. [3 ]
Chen, Liming [4 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] East China Normal Univ, Sch Comp Sci & Software Engn, Shanghai, Peoples R China
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS, Canada
[4] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
基金
中国国家自然科学基金;
关键词
IoT Security; Zigbee security; SRAM-PUF; Hardware security; Secret keys;
D O I
10.1016/j.ins.2019.06.066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is expanding rapidly and so is the number of devices, sensors and actuators joining this world. IoT devices are an important part of the data collection process in Big Data systems, so by protecting them we support and improve the security of the whole system. ZigBee is a secure communication system for the underlying Internet of Things (IoT) infrastructure. Even though ZigBee has a strong security stack built on a variety of secret keys, ZigBee devices are vulnerable to the side-channel and key extraction attacks. Due to the low cost and limited resources, most ZigBee devices store their secret keys in plaintext. In this paper, we focus on protecting the storage of ZigBee secret keys and show how Physical Unclonable Functions (PUFs) can help the ZigBee devices to be robust tamper-resistant against the physical attacks. The proposed schemes include PUF-based key storage protection and key generation. The experiments in this paper were done using SRAM-PUF. Furthermore, two algorithms were proposed to overcome the defects in the randomness of keys generated using SRAM-PUF and, at the same time, to increase the reliability of these keys. We were able to significantly improve the hardware security of ZEDS by protecting their keying materials using costless, high secure, random, stable and volatile PUF-based secret keys. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:307 / 318
页数:12
相关论文
共 22 条
  • [1] Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module
    Akriotou, Marialena
    Mesaritakis, Charis
    Grivas, Evaggelos
    Chaintoutis, Charidimos
    Fragkos, Alexandros
    Syvridis, Dimitris
    [J]. SECURITY IN COMPUTER AND INFORMATION SCIENCES, EURO-CYBERSEC 2018, 2018, 821 : 28 - 37
  • [2] Aliance Z., 2012, 053474R20 ZIGBEE STA
  • [3] A Formal Foundation for the Security Features of Physical Functions
    Armknecht, Frederik
    Maes, Roel
    Sadeghi, Ahmad-Reza
    Standaert, Francois-Xavier
    Wachsmann, Christian
    [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 397 - 412
  • [4] A PUF-Based Secure Communication Protocol for IoT
    Chatterjee, Urbi
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (03)
  • [5] Eichhorn I., 2011, LOGICALLY RECONFIGUR, P59, DOI [10.1145/2046582.2046594, DOI 10.1145/2046582.2046594]
  • [6] Garg A, 2014, IEEE INT SYMP CIRC S, P1941, DOI 10.1109/ISCAS.2014.6865541
  • [7] Identification and authentication of integrated circuits
    Gassend, B
    Lim, D
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11) : 1077 - 1098
  • [8] Gassend B., CONTROLLED PHYS RAND, P235, DOI DOI 10.1007/978-1-84628-984-2_14
  • [9] Guajardo J, 2007, LECT NOTES COMPUT SC, V4727, P63
  • [10] Secure and Reliable Key Agreement with Physical Unclonable Functions
    Gunlu, Onur
    Kernetzky, Tasnad
    Iscan, Onurcan
    Sidorenko, Vladimir
    Kramer, Gerhard
    Schaefer, Rafael F.
    [J]. ENTROPY, 2018, 20 (05)