Advertisement

Innovative Hardware-Based Cybersecurity Solutions

  • Octavian IonescuEmail author
  • Viorel Dumitru
  • Emil Pricop
  • Stefan Pircalabu
Chapter
  • 283 Downloads
Part of the Studies in Systems, Decision and Control book series (SSDC, volume 255)

Abstract

Cyber threats are currently targeting not only the individual computers, but the industrial infrastructures managed by industrial control systems, that are often interconnected in large networks. The recent developments in the field of electronic devices, namely sensors and wearable equipment, and the evolution of communication technologies permitted the adaptation of Internet of Things (IoT) devices on a large scale. These IoT devices contains computing power, good connectivity, but are prone to a large number of cybersecurity vulnerabilities and attacks. This chapter is focused on describing some innovative hardware-based cybersecurity solutions de-signed especially for Internet of Things devices. The proposed solutions are based on physical unclonable functions (PUF) encryption methods. The first method is based on unique features which are the results of variable entries in the process of manufacturing semiconductor devices. An example of an encryption system already developed and available on the market is presented. The second method is based on the proper-ties of memristors, mainly the nonlinearity of the I–V characteristics and the particularities in their production process, which allow generating unique material states. By using this method, it is possible to generate very large random encryption keys, using few electrical components. This solution could be incorporated in various security systems that uses parallel communication channels to send and receive the voltage level to be used in reading the memristors, as well as to physically control the connection to the main data transfer channel, being it Ethernet, Wi-Fi or another broad-band connection.

Keywords

Cybersecurity Memristor Physical unclonable functions Data encryption Key generating Physical link control 

References

  1. 1.
    IHS: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
  2. 2.
    Sathwara, S., Dutta, N., Pricop, E.: IoT Forensic A digital investigation framework for IoT systems. In: Proceedings of 10th International Conference Electronic Computer Artificial Intelligence. ECAI 2018.  https://doi.org/10.1109/ecai.2018.8679017 (2019)
  3. 3.
    Spognardi, A., De Donno, M., Dragoni, N., Giaretta, A.: Analysis of DDoS-Capable IoT Malwares. In: Proceedings 2017 Federated Conference on Computer Science and Information Systems vol. 11, pp. 807–816.  https://doi.org/10.15439/2017f288 (2017)
  4. 4.
    Bauder, D.: An Anti-Counterfeiting Concept for Currency Systems. Sandia Natl. Labs, Albuquerque, NM, Technical Report (1983)Google Scholar
  5. 5.
    Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(80–), 2026–2030 (2002).  https://doi.org/10.1126/science.1074376
  6. 6.
    Wu, M.Y., Yang, T.H., Chen, L.C., Lin, C.C., Hu, H.C., Su, F.Y., Wang, C.M., Huang, J.P.H., Chen, H.M., Lu, C.C.H., Yang, E.C.S., Shen, R.S.J.: A PUF scheme using competing oxide rupture with bit error rate approaching zero. In: Digital Technical Paper—IEEE International Solid-State Circuits Conference, vol. 61, pp. 130–132.  https://doi.org/10.1109/isscc.2018.8310218 (2018)
  7. 7.
  8. 8.
    Intrinsic-ID: Altera Reveals Stratix 10 with Intrinsic-ID’s PUF technology. https://www.intrinsic-id.com/altera-reveals-stratix-10-with-intrinsic-ids-puf-technology/
  9. 9.
    Maxim-Integrated: DS28E38 DeepCover® Secure ECDSA Authenticator with ChipDNA PUF Protection. https://www.maximintegrated.com/en/products/embedded-security/DS28E50.html
  10. 10.
    McGrath, T., Bagci, I.E., Wang, Z.M., Roedig, U., Young, R.J.: A PUF taxonomy. Appl. Phys. Rev. 6 (2019).  https://doi.org/10.1063/1.5079407
  11. 11.
    Halevi, S., Krawczyk, H.: Strengthening Digital Signatures Via Randomized Hashing, pp. 41–59.  https://doi.org/10.1007/11818175_3 (2006)
  12. 12.
    Chua, L.: Memristor-the missing circuit element. IEEE Trans. Circuit Theory 18, 507–519 (1971).  https://doi.org/10.1109/TCT.1971.1083337CrossRefGoogle Scholar
  13. 13.
    Abraham, I.: The case for rejecting the memristor as a fundamental circuit element. Sci. Rep. 8 (2018).  https://doi.org/10.1038/s41598-018-29394-7
  14. 14.
    Chua, L.: Resistance switching memories are memristors. Appl. Phys. A Mater. Sci. Process. 102, 765–783 (2011).  https://doi.org/10.1007/s00339-011-6264-9CrossRefzbMATHGoogle Scholar
  15. 15.
    Rainer, W., Masakazu, A.: Nanoionics-based resistive switching memories. Nat. Mater. 6, 833–840 (2007)CrossRefGoogle Scholar
  16. 16.
    Dumitru, V.-G., Besleaga Stan, C., Botea, I.-M.: Memristive device, US Patent Application, US Provisional Application Serial No 62/844,936 (2019)Google Scholar
  17. 17.
    Vernam, G.S.: Automatic telegraph switching system plan 55-A. Trans. Am. Inst. Electr. Eng. Part I Commun. Electron. 77, 239–247 (2013).  https://doi.org/10.1109/tce.1958.6372793

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Octavian Ionescu
    • 1
    Email author
  • Viorel Dumitru
    • 2
  • Emil Pricop
    • 3
  • Stefan Pircalabu
    • 4
  1. 1.National Institute for Research and Development in Microtechnologies, IMT BucharestBucharestRomania
  2. 2.National Institute of Materials PhysicsMagureleRomania
  3. 3.Petroleum-Gas University of PloiestiPloiestiRomania
  4. 4.Cyberswarm Inc.San MateoUSA

Personalised recommendations