Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2899007.2899013acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

Position Paper: Physical Unclonable Functions for IoT Security

Published: 30 May 2016 Publication History

Abstract

Devices in the Internet of Things (IoT) introduce unique security challenges due to their operating conditions and device limitations. Existing security solutions based on classical cryptography have significant drawbacks in IoT devices, primarily due to the possibility of physical and side channel attacks. As an alternative approach, this position paper advocates the use of physical unclonable functions (PUFs) as a security primitive for developing security solutions for IoT devices. Preliminary work on developing a PUF based mutual authentication protocol is also presented.

References

[1]
. P. Skorobogatov. "Semi-invasive attacks - a new approach to hardware security analysis," Technical Report UCAM-CL-TR-630, University of Cambridge Computer Laboratory, April 2005.
[2]
. Lofstrom, W. R. Daasch, and D. Taylor. "IC identification circuit using device mismatch," Proceedings of ISSCC 2000, February 2000.
[3]
. E. Suh, and S. Devadas "Pysical Unclonable Functions for Device Authentication and Secret Key Generation," Proceedings of IEEE/ACM DAC, pp. 9--14, San Diego, CA, June 2007.
[4]
. Xu, J. B. Wendt, and M. Potkonjak, "Security of IoT Systems: Design Challenges and Opportunities," Proceedings of IEEE/ACM ICCAD, pp. 417--423, San Jose, CA, November 2014.
[5]
J. B. Wendt and M. Potkonjak, "Hardware obfuscation using PUFbased logic," International Conference on Computer-Aided Design (ICCAD), pp. 1--8, 2014.
[6]
. Xu, J. B. Wendt, and M. Potkonjak, "Secure remote sensing and communication using digital PUFs," Symposium on Architectures for Networking and Communications Systems (ANCS), pp. 1--12, 2014.
[7]
. Mahmoud et. al. "Combined Modeling and Side Channel Attacks on Strong PUFs," IACR Cryptology ePrint Archive, no. 632, 2013.
[8]
. Guilley, and R. Pacalet, "SoCs security: a war against side-channels", Annals of Telecommunications, Vol. 59, no. 7, pp 998--1009, 2004.
[9]
. J. Hinek, Cryptanalysis of RSA and its variants. Taylor and Francis group: CRC Press, 2009.
[10]
. Ghaith, O. Erdinc, and S. Berk, "A Tamper-Proof and Lightweight Authentication Scheme", Pervasive Mobile Computing, Vol.4, no.6, pp. 807--818, 2008.

Cited By

View all
  • (2024)Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future DirectionsACM Computing Surveys10.1145/363503056:5(1-37)Online publication date: 12-Jan-2024
  • (2024)Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic KeysIntelligent Computing10.1007/978-3-031-62277-9_31(478-498)Online publication date: 13-Jun-2024
  • (2023)Device Fingerprinting for Cyber-Physical Systems: A SurveyACM Computing Surveys10.1145/358494455:14s(1-41)Online publication date: 21-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IoTPTS '16: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security
May 2016
54 pages
ISBN:9781450342834
DOI:10.1145/2899007
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. internet of things
  2. physical unclonable functions
  3. tamper proof security

Qualifiers

  • Short-paper

Conference

ASIA CCS '16
Sponsor:

Acceptance Rates

IoTPTS '16 Paper Acceptance Rate 6 of 12 submissions, 50%;
Overall Acceptance Rate 16 of 39 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)3
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future DirectionsACM Computing Surveys10.1145/363503056:5(1-37)Online publication date: 12-Jan-2024
  • (2024)Secure Content Protection Schemes for Industrial IoT with SRAM PUF-Based One-Time Use Cryptographic KeysIntelligent Computing10.1007/978-3-031-62277-9_31(478-498)Online publication date: 13-Jun-2024
  • (2023)Device Fingerprinting for Cyber-Physical Systems: A SurveyACM Computing Surveys10.1145/358494455:14s(1-41)Online publication date: 21-Feb-2023
  • (2022)Implementation and characterization of flash‐based hardware security primitives for cryptographic key generationETRI Journal10.4218/etrij.2021-045545:2(346-357)Online publication date: 25-Oct-2022
  • (2022)Countering Modeling Attacks in PUF-based IoT Security SolutionsACM Journal on Emerging Technologies in Computing Systems10.1145/349122118:3(1-28)Online publication date: 22-Mar-2022
  • (2022)Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key ExchangeIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.321408917(3847-3862)Online publication date: 2022
  • (2022)IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT NetworksIEEE Systems Journal10.1109/JSYST.2021.307040416:3(3468-3479)Online publication date: Sep-2022
  • (2022)A PUF-Based Modeling-Attack Resilient Authentication Protocol for IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2021.30984969:5(3684-3703)Online publication date: 1-Mar-2022
  • (2022)SWeeT: Security Protocol for Wearables Embedded Devices’ Data Transmission2022 IEEE International Conference on E-health Networking, Application & Services (HealthCom)10.1109/HealthCom54947.2022.9982744(135-141)Online publication date: 17-Oct-2022
  • (2022)Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-securityComplex & Intelligent Systems10.1007/s40747-022-00667-z8:4(3559-3591)Online publication date: 24-Feb-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media