A Novel IoT Sensor Authentication Using HaLo Extraction Method and Memory Chip Variability

09/03/2021
by   Holden Gordon, et al.
0

In this paper, we propose flash-based hardware security primitives as a viable solution to meet the security challenges of the IoT and specifically telehealth markets. We have created a novel solution, called the High and Low (HaLo) method, that generates physical unclonable function (PUF) signatures based on process variations within flash memory in order to uniquely identify and authenticate remote sensors. The HaLo method consumes 60 conventional authentication schemes, has an average latency of only 39ms for signature generation, and can be readily implemented through firmware on ONFI 2.2 compliant off-the-shelf NAND flash memory chips. The HaLo method generates 512 bit signatures with an average error rate of 5.9 * 10^-4, while also adapting for flash chip aging. Due to its low latency, low error rate, and high power efficiency, the HaLo method could help progress the field of remote patient monitoring by accurately and efficiently authenticating remote health sensors.

READ FULL TEXT

page 3

page 6

page 7

page 9

page 12

research
05/20/2023

Post-Quantum Hybrid Digital Signatures with Hardware-Support for Digital Twins

Digital Twins (DT) virtually model cyber-physical objects using Internet...
research
03/06/2019

ARIS: Authentication for Real-Time IoT Systems

Efficient authentication is vital for IoT applications with stringent mi...
research
07/19/2021

A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips

Many commercially available memory chips are fabricated worldwide in unt...
research
07/20/2020

Exploiting Process Variations to Secure Photonic NoC Architectures from Snooping Attacks

The compact size and high wavelength-selectivity of microring resonators...
research
07/28/2023

PUF Probe: A PUF-based Hardware Authentication Equipment for IEDs

Intelligent Electronic Devices (IEDs) are vital components in modern ele...
research
03/29/2022

The root extraction problem in braid group-based cryptography

The root extraction problem in braid groups is the following: given a br...
research
06/11/2020

Fingerprinting Analog IoT Sensors for Secret-Free Authentication

Especially in context of critical urban infrastructures, trust in IoT da...

Please sign up or login with your details

Forgot password? Click here to reset