Hardware Implementation of Keyless Encryption Scheme for Internet of Things Based on Image of Memristors

by   Mohammad Mohammadinodoushan, et al.

The Internet of Things (IoT) is rapidly increasing the number of connected devices. This causes new concerns towards solutions for authenticating numerous IoT devices. Most of these devices are resource-constrained. Therefore, the use of long-secret keys, in traditional cryptography schemes can be hard to implement. Also, the key generation, distribution, and storage are very complex. Moreover, the goal of many reported cyber-attacks is accessing the key. Therefore, researchers have shown an increased interest in designing keyless encryption schemes recently. In this report, we are going to explain the details of the implementation of the keyless protocol by taking advantage of known technology modules such as microcontrollers (MCU), and hash functions. Physical Unclonable Functions (PUFs) have been used in many cryptographic applications such as Password Management Systems, key exchange, Key Generation. In this report, we are going to explain the details of the hardware implementation of keyless encryption in the MCU. Different kinds of memristors have been used in the past. In this work, a look-up-table containing memristor cells value at the various current levels is used since the physical component is unavailable yet. The hardware that is used to implement the system is an evaluation-board of SAMV71 MCU, which is used to implement the control system and hardware hashing.



There are no comments yet.


page 2

page 3

page 4

page 5

page 7


A Lightweight Encryption Scheme for IoT Devices in the Fog

The Internet of Things (IoT) comprises of a heterogeneous mix of smart d...

Implementation of password manager with sram-based physical unclonable function

Hacking password databases is one of the most frequently reported cyber-...

Hardware Software Co-design framework for Data Encryption in Image Processing Systems for the Internet of Things Environmen

Data protection is a severe constraint in the heterogeneous IoT era. Thi...

Performance Evaluation of Cryptographic Ciphers on IoT Devices

With the advent of Internet of Things (IoT) and the increasing use of ap...

On the reliability of computational chaos-based cryptography for information exchange

This paper investigates the use of dynamical chaotic systems to encrypt ...

Public Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

The number of embedded devices that connect to a wireless network has be...

NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions

Given the ubiquity of memory in commodity electronic devices, fingerprin...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.