Crossover RO PUF-based Key Sharing for IoT Security

07/28/2018
by   Jiliang Zhang, et al.
0

In many Internet of Things (IoT) applications, resources like CPU, memory, and battery power are limited and cannot afford the classic cryptographic security solutions. Silicon Physical Unclonable Function (PUF) is a lightweight security primitive that exploits manufacturing variations during the chip fabrication process for key generation and/or device authentication. Ring Oscillator (RO) PUF as one of the most popular silicon weak PUFs can generate secret bits by comparing the frequency difference between any two ROs. Previous RO PUFs improve flexibility and reliability through adding redundant ROs, which incurs unacceptable hardware overheads. In addition, traditional weak PUFs such as RO PUF generate chip-unique key for each device, which restricts their application in security protocols where the same key is required to be shared in resource-constrained devices. In order to address these shortcomings, we propose a crossover RO PUF (CRO PUF) that improves flexibility, reliability and reduces hardware overheads. It is the first PUF that can generate the shared key in physically. The basic idea is to implement one-to-one input-output mapping with Lookup Table (LUT)-based interstage crossing structures in each level of inverters. Individual customization on configuration bits of interstage crossing structure and different RO selections with challenges bring high flexibility. Therefore, with the flexible configuration of interstage crossing structures and challenges, CRO PUF can generate the same shared key for resource-constrained devices, which enables a new application for lightweight key sharing protocols. Experimental results show that our proposed PUF structure has much lower hardware overheads, better uniqueness and reliability than the previous configurable RO PUFs.

READ FULL TEXT
research
05/17/2018

A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

Some of the main challenges towards utilizing conventional cryptographic...
research
02/08/2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices

A securely maintained key is the premise upon which data stored and tran...
research
07/19/2023

EPUF: A Novel Scheme Based on Entropy Features of Latency-based DRAM PUFs Providing Lightweight Authentication in IoT Networks

Physical unclonable functions (PUFs) are hardware-oriented primitives th...
research
07/29/2019

A Survey on Hardware-based Security Mechanisms for Internet of Things

The vast areas of applications for IoTs in future smart cities, industri...
research
10/04/2022

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Physical Unclonable Functions (PUFs) are promising security primitives f...
research
05/19/2018

Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses

The physical unclonable function (PUF), alike fingerprint of human being...
research
01/17/2019

New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures

A new large class of 2^100 possible stream ciphers as keystream generato...

Please sign up or login with your details

Forgot password? Click here to reset