A Secure Back-up and Restore for Resource-Constrained IoT based on Nanotechnology

07/09/2020
by   Mesbah Uddin, et al.
0

With the emergence of IoT (Internet of things), huge amounts of sensitive data are being processed and transmitted everyday in edge devices with little to no security. Due to their aggressive power management schemes, it is a common and necessary technique to make a back-up of their program states and other necessary data in a non-volatile memory (NVM) before going to sleep or low power mode. However, this memory is often left unprotected as adding robust security measures tends to be expensive for these resource constrained systems. In this paper, we propose a lightweight security system for NVM during low power mode. This security architecture uses the memristor, an emerging nanoscale device which is used to build hardware security primitives like PUF (physical unclonable function) based encryption-decryption, true random number generators (TRNG), and memory integrity checking. A reliability enhancement technique for this PUF is also proposed which shows how this system would work even with less-than-100% reliable PUF responses. Together, with all these techniques, we have established a dual layer security protocol (data encryption+integrity check) which provides reasonable security to an embedded processor while being very lightweight in terms of area, power, and computation time. A complete system design is demonstrated with 65nm CMOS and emerging memristive technology. With this, we have provided a detailed and accurate estimation of resource overhead. Analysis of the security of the whole system is also provided.

READ FULL TEXT

page 1

page 3

research
05/26/2023

Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

The Global Wearable market is anticipated to rise at a considerable rate...
research
06/14/2018

Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices

In recent years, due to the trend in globalization, system integrators h...
research
02/08/2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices

A securely maintained key is the premise upon which data stored and tran...
research
01/15/2023

Secure Video Streaming Using Dedicated Hardware

Purpose: The purpose of this article is to present a system that enhance...
research
04/06/2023

A Context-Switching/Dual-Context ROM Augmented RAM using Standard 8T SRAM

The landscape of emerging applications has been continually widening, en...
research
04/12/2018

Lightweight Joint Compression-Encryption-Authentication-Integrity Framework Based on Arithmetic Coding

Arithmetic Coding is an efficient lossless compression scheme applied fo...
research
07/23/2020

A Guideline on Pseudorandom Number Generation (PRNG) in the IoT

Security and trust are essential building blocks for the emerging Intern...

Please sign up or login with your details

Forgot password? Click here to reset