Advertisement

A Study on Physical Unclonable Functions Based Security for Internet of Things Applications

  • Swati KulkarniEmail author
  • R. M. Vani
  • P. V. Hunagund
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)

Abstract

Wireless communication trends are getting changed day by day. Internet of Things (IoT) is the latest running trend of wireless communication. IoT applications are very demanding in present and many more will come in the near future. IoT applications are running in insure medium i.e. Internet. Security and Privacy are the major challenges in IoT implementation. In conventional cryptography, one dedicated secret key is stored in volatile or non-volatile memory. Which has been used by the processor for every encryption or decryption Even though system is turned off the secret key is remain present in memory and can be access by attacker using side channel attacks. Thus, the traditional approaches to key storage are not favoured. Physically Unclonable function (PuF) can resolve such issues. Instead of using the same dedicated secrete key PuF can generate unique bits for every operation. Here we are presenting a brief survey of security challenges opportunities of PuF for IoT applications.

Keywords

Cryptography Hardware security PuF Arbiter PuF Ring Oscillator PuF IoT 

References

  1. 1.
    Aidasani, L.K., Bhadkamkar, H., Kashyap, A.K.: IoT: the kernel of smart cities. In: Third International Conference on Science Technology Engineering & Management (ICONSTEM), pp. 8–11 (2017)Google Scholar
  2. 2.
    Pocklassery, G., Kajuruli, V.K., Plusquellic, J., Saqib, F.: Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems. In: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 116–121 (2017)Google Scholar
  3. 3.
    Kulkarni, S., Vani, R.M., Hunagund, P.V.: Review on IoT based case study: applications and challenges. In: Hemanth, J., Fernando, X., Lafata, P., Baig, Z. (eds.) International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI), ICICI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 26. Springer, Cham (2019)Google Scholar
  4. 4.
    Sklavos, N.: Securing communication devices via physical unclonable functions (PUFs). In: Reimer, H., Pohlmann, N., Schneider, W. (eds.) Securing Electronic Business Processes, ISSE 2013. Springer Vieweg, Wiesbaden (2013)Google Scholar
  5. 5.
    Joshi, S., Mohanty, S.P., Kougianos, E.: Everything you wanted to know about PUFs. IEEE Potentials 36(6), 38–46 (2017).  https://doi.org/10.1109/mpot.2015.2490261CrossRefGoogle Scholar
  6. 6.
    Rührmair, U., Holcomb, D.E.: PUFs at a glance. In: Proceedings of the Conference on Design, Automation & Test in Europe, pp. 347:1–347:6 (2014)Google Scholar
  7. 7.
    Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Sci. J. 297(5589), 2026–2030 (2002)Google Scholar
  8. 8.
    Tajik, S., Dietz, E., Frohmann, S., Seifert, J.-P., Nedospasov, D., Helfmeier, C., Boit, C., Dittrich, H.: Physical characterization of arbiter PUFs. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  9. 9.
    Herder, C., (Mandel) Yu, M.-D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102, 1126–1141 (2014)Google Scholar
  10. 10.
    Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: 44th ACM/IEEE Design Automation Conference, San Diego, CA (2007)Google Scholar
  11. 11.
    Gehrer, S., Leger, S., Sigl, G.: Aging effects on ring-oscillator-based physical unclonable functions on FPGAs. In: 2015 International 8th Conference on ReConFigurable Computing and FPGAs (ReConFig), Mexico City (2015)Google Scholar
  12. 12.
    Yin, C.E., Qu, G., Zhou, Q.: Design and ımplementation of a group-based RO PUF. In: Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France (2013)Google Scholar
  13. 13.
    Bhargava, M., Mai, K.: An efficient reliable PUF-based cryptographic key generator in 65 nm CMOS. In: 2014 Design, Automation & Test in Europe Conference & Exhibition, Dresden (2014)Google Scholar
  14. 14.
    Anandakumar, N.N., Hashmi, M.S., Sanadhya, S.K.: Compact implementations of FPGA-based PUFs with enhanced performance. In: 30th International Conference on VLSI Design and 2017 16th International Conference on Embedded Systems (VLSID), pp. 161–166 (2017)Google Scholar
  15. 15.
    Katzenbeisser, S., Kocabaş, Ü., Rožić, V., Sadeghi, A.-R., Verbauwhede, I., Wachsmann, C.: PUFs: myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon. In: International Association for Cryptologic Research, pp. 283–301 (2012)Google Scholar
  16. 16.
    Aman, M.N., Chua, K.C., Sikder, B.: Physical unclonable functions for IoT security. ACM.  https://doi.org/10.1145/1235
  17. 17.
    Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007)Google Scholar
  18. 18.
    Mughal, M.A., Luo, X., Mahmood, Z., Ullah, A.: Physical Unclonable Function based authentication scheme for smart devices in Internet of Things. In: 2018 IEEE International Conference on Smart Internet of Things, pp. 160–165. IEEE (2018)Google Scholar
  19. 19.
    Johnson, A.P., Chakroborty, R.S., Mukhopadhyay, D.: A PUF-enabled secure architecture for FPGA-based IoT applications. IEEE Trans. Multi-scale Comput. Syst. 1(2), 110–122 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Applied ElectronicsGulbarga UniversityGulbargaIndia
  2. 2.University Science Instrumentation CentreGulbarga UniversityGulbargaIndia

Personalised recommendations