A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

05/17/2018
by   Ashwija Reddy Korenda, et al.
0

Some of the main challenges towards utilizing conventional cryptographic techniques in Internet of Things (IoT) include the need for generating secret keys for such a large-scale network, distributing the generated keys to all the devices, key storage as well as the vulnerability to security attacks when an adversary gets physical access to the devices. In this paper, a novel secret key generation method is proposed for IoTs that utilize the intrinsic randomness embedded in the devices' memories introduced in the manufacturing process. A fuzzy extractor structure using serially concatenated BCH-Polar codes is proposed to generate reproducible keys from a ReRAM-based ternary-state Physical Unclonable Functions (PUFs) for device authentication and secret key generation. The ReRAM based PUFs are the most practical choice for authentication and key generation in IoT, as they operate at or below the systems' noise level and therefore are less vulnerable to side channel attacks compared to the alternative memory technologies. However, the current ReRAM-based PUFs present a high false negative authentication rate since the behavior of these devices can vary in different physical conditions that results in a low probability of regenerating the same response in different attempts. In this paper, we propose a secret key generation scheme for ternary state PUFs that enables reliable reconstruction of the desired secret keys utilizing a serially concatenated BCH-Polar fuzzy extractor. The experimental results show that the proposed model can offer a significantly lower probability of mismatch between the original key and the regenerated ones, while a less number of Helper data bits were used to extract the Key when compared to previously proposed fuzzy extractor techniques.

READ FULL TEXT
research
07/29/2019

A Survey on Hardware-based Security Mechanisms for Internet of Things

The vast areas of applications for IoTs in future smart cities, industri...
research
07/28/2019

A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices

This paper provides a proof of concept for using SRAM based Physically U...
research
02/08/2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices

A securely maintained key is the premise upon which data stored and tran...
research
11/23/2022

Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

Application authentication is typically performed using some form of sec...
research
02/20/2021

A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding

Physical unclonable functions (PUFs) are widely considered in secret key...
research
08/03/2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks

The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagat...
research
07/28/2018

Crossover RO PUF-based Key Sharing for IoT Security

In many Internet of Things (IoT) applications, resources like CPU, memor...

Please sign up or login with your details

Forgot password? Click here to reset