Public-Key Based Authentication Architecture for IoT Devices Using PUF

02/04/2020
by   Haji Akhundov, et al.
0

Nowadays, Internet of Things (IoT) is a trending topic in the computing world. Notably, IoT devices have strict design requirements and are often referred to as constrained devices. Therefore, security techniques and primitives that are lightweight are more suitable for such devices, e.g., Static Random-Access Memory (SRAM) Physical Unclonable Functions (PUFs) and Elliptic Curve Cryptography (ECC). SRAM PUF is an intrinsic security primitive that is seeing widespread adoption in the IoT segment. ECC is a public-key algorithm technique that has been gaining popularity among constrained IoT devices. The popularity is due to using significantly smaller operands when compared to other public-key techniques such as RSA (Rivest Shamir Adleman). This paper shows the design, development, and evaluation of an application-specific secure communication architecture based on SRAM PUF technology and ECC for constrained IoT devices. More specifically, it introduces an Elliptic Curve Diffie-Hellman (ECDH) public-key based cryptographic protocol that utilizes PUF-derived keys as the root-of-trust for silicon authentication. Also, it proposes a design of a modular hardware architecture that supports the protocol. Finally, to analyze the practicality as well as the feasibility of the proposed protocol, we demonstrate the solution by prototyping and verifying a protocol variant on the commercial Xilinx Zynq-7000 APSoC device.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/30/2019

Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks

With the advancement of technology, devices, which are considered non-tr...
research
10/11/2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

Continuous Authentication (CA) has been proposed as a potential solution...
research
12/21/2017

A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to Enhance Authentication Security in Software Defined Wireless Networks

The exponentially increasing number of ubiquitous wireless devices conne...
research
01/17/2023

PUF for the Commons: Enhancing Embedded Security on the OS Level

Security is essential for the Internet of Things (IoT). Cryptographic op...
research
02/26/2020

Peripheral-free Device Pairing by Randomly Switching Power

The popularity of Internet-of-Things (IoT) comes with security concerns....
research
08/02/2018

Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF

Secure group-oriented communication is crucial to a wide range of applic...
research
07/22/2020

Formal Analysis of EDHOC Key Establishment for Constrained IoT Devices

The IETF is standardizing an authenticated key establishment (AKE) proto...

Please sign up or login with your details

Forgot password? Click here to reset