Building Secure SRAM PUF Key Generators on Resource Constrained Devices

02/08/2019
by   Yansong Gao, et al.
0

A securely maintained key is the premise upon which data stored and transmitted by ubiquitously deployed resource limited devices, such as those in the Internet of Things (IoT), are protected. However, many of these devices lack a secure non-volatile memory (NVM) for storing keys because of cost constraints. Silicon physical unclonable functions (PUFs) offering unique device specific secrets to electronic commodities are a low-cost alternative to secure NVM. As a physical hardware security primitive, reliability of a PUF is affected by thermal noise and changes in environmental conditions; consequently, PUF responses cannot be directly employed as cryptographic keys. A fuzzy extractor can turn noisy PUF responses into usable cryptographic keys. However, a fuzzy extractor is not immediately mountable on (highly) resource constrained devices due to its implementation overhead. We present a methodology for constructing a lightweight and secure PUF key generator for resource limited devices. In particular, we focus on PUFs constructed from pervasively embedded SRAM in modern microcontroller units and use a batteryless computational radio frequency identification (CRFID) device as a representative resource constrained IoT device in a case study.

READ FULL TEXT
research
05/17/2018

A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

Some of the main challenges towards utilizing conventional cryptographic...
research
05/19/2018

Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses

The physical unclonable function (PUF), alike fingerprint of human being...
research
02/08/2019

Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study

Recently, we have witnessed the emergence of intermittently powered comp...
research
02/14/2021

A novel key pre-distribution scheme based on μ-PBIBD combinatorial design in the resource-constrained IoT network

In a resource-constrained IoT network, end nodes like WSN, RFID, and emb...
research
11/04/2017

Secure Communications using Nonlinear Silicon Photonic Keys

We present a secure communication system constructed using pairs of nonl...
research
07/28/2018

Crossover RO PUF-based Key Sharing for IoT Security

In many Internet of Things (IoT) applications, resources like CPU, memor...
research
07/09/2020

A Secure Back-up and Restore for Resource-Constrained IoT based on Nanotechnology

With the emergence of IoT (Internet of things), huge amounts of sensitiv...

Please sign up or login with your details

Forgot password? Click here to reset