COMA: Communication and Obfuscation Management Architecture

09/01/2019
by   Kimia Zamiri Azar, et al.
0

In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to/from untrusted yet obfuscated circuits. COMA addresses three challenges related to the obfuscated circuits: First, it removes the need for the storage of the obfuscation unlock key at the untrusted chip. Second, it implements a mechanism by which the key sent for unlocking an obfuscated circuit changes after each activation (even for the same device), transforming the key into a dynamically changing license. Third, it protects the communication to/from the COMA protected device and additionally introduces two novel mechanisms for the exchange of data to/from COMA protected architectures: (1) a highly secure but slow double encryption, which is used for exchange of key and sensitive data (2) a high-performance and low-energy yet leaky encryption, secured by means of frequent key renewal. We demonstrate that compared to state-of-the-art key management architectures, COMA reduces the area overhead by 14 authentication, enabling activation as a service (for IoT devices), reducing the side channel threats on key management architecture, and providing two new means of secure communication to/from an untrusted chip.

READ FULL TEXT

page 4

page 5

page 6

research
08/02/2018

Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF

Secure group-oriented communication is crucial to a wide range of applic...
research
12/20/2018

Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool

With the rapid development of the Internet of things (IoT), more and mor...
research
04/13/2020

ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things

The resource-constrained nature of the Internet of Things (IoT) devices,...
research
06/28/2023

BLEND: Efficient and blended IoT data storage and communication with application layer security

Many IoT use cases demand both secure storage and secure communication. ...
research
01/15/2023

Secure Video Streaming Using Dedicated Hardware

Purpose: The purpose of this article is to present a system that enhance...
research
10/04/2021

From cold resistor to secure key exchanger

Utilizing a formerly published cold resistor circuitry, a secure key exc...
research
02/15/2021

Secure Hybrid ITS Communication with Data Protection

In the future world of safe traffic, intelligent transportation systems ...

Please sign up or login with your details

Forgot password? Click here to reset