A Survey on Hardware-based Security Mechanisms for Internet of Things

07/29/2019
by   Alireza Shamsoshoara, et al.
0

The vast areas of applications for IoTs in future smart cities, industrial automation, smart transportation systems, and smart health facilities represent a thriving surface for several security attacks with enormous economic, environmental and societal impacts. This survey paper presents a review of several security challenges of emerging IoT networks and discusses some of the attacks and their countermeasures based on different domains in IoT networks. Most conventional security solutions for IoT networks are adopted from communication networks while noting the particular characteristics of IoT networks such as the huge number of nodes, heterogeneity of the network, and the limited energy, communication, and computation of the nodes, these conventional security methods are not really adequate. One important challenge toward utilizing common secret key-based cryptographic methods in very large scale IoT networks is the problem of secret key generation, distribution, and storage in IoT devices and more importantly protecting these secret keys from physical attacks. Physically unclonable functions (PUFs) are recently utilized as a promising hardware security solution for identification and authentication in IoT networks. Since PUFs extract the unique hardware characteristics, they potentially offer an affordable and practical solution for secret key generation. However, several barriers limit the applications of different types of PUFs for key generation purposes. We discuss the advantages of PUF-based key generation methods, review the state-of-the-art techniques in this field and propose a reliable PUF-based solution for secret key generation using resistive random-access memories (RERAMs) embedded in IoTs.

READ FULL TEXT

page 16

page 23

research
05/17/2018

A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

Some of the main challenges towards utilizing conventional cryptographic...
research
10/29/2019

Simultaneous Interference-Data Transmission for Secret Key Generation in Distributed IoT Sensor Networks

Internet of Things (IoT) networks for smart sensor nodes in the next gen...
research
08/16/2021

Secret Sharing-based Personal Health Records Management for the Internet of Health Things

The holistic concept of smart cities has been adopted to increase econom...
research
07/28/2019

A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices

This paper provides a proof of concept for using SRAM based Physically U...
research
07/03/2023

Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions

As the number of devices being interconnected increases, so does also th...
research
07/28/2018

Crossover RO PUF-based Key Sharing for IoT Security

In many Internet of Things (IoT) applications, resources like CPU, memor...
research
08/03/2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks

The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagat...

Please sign up or login with your details

Forgot password? Click here to reset