Skip to main content

Using Physical Unclonable Functions for Internet-of-Thing Security Cameras

  • Conference paper
  • First Online:
Interoperability, Safety and Security in IoT (InterIoT 2017, SaSeIoT 2017)

Abstract

This paper proposes a low-cost solution to develop IoT security cameras. Integrity and confidentiality of the image data are achieved by cryptographic modules that implement symmetric key-based techniques which are usually available in the hardware of the IoT cameras. The novelty of this proposal is that the secret key required is not stored but reconstructed from the start-up values of a SRAM in the camera hardware acting as a PUF (Physical Unclonable Function), so that the physical authenticity of the camera is also ensured. The start-up values of the SRAM are also exploited to change the IV (Initialization Vector) in the encryption algorithm. All the steps for enrollment and normal operation can be included in a simple firmware to be executed by the camera. There is no need to include specific hardware but only a SRAM is needed which could be powered down and up by firmware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. IEEE Comput. 50(7), 80–84 (2017)

    Article  Google Scholar 

  2. Chen, S., Pande, A., Mohapatra, P.: Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications and Services, pp. 109–122 (2014)

    Google Scholar 

  3. Li, C.-T.: Multimedia Forensics and Security. Information Science Reference, Hershey (2009)

    Book  Google Scholar 

  4. Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)

    MATH  Google Scholar 

  5. Winkler, T., Rinner, B.: Privacy and security in video surveillance. In: Atrey, P., Kankanhalli, M., Cavallaro, A. (eds.) Intelligent Multimedia Surveillance: Current Trends and Research, pp. 37–66. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41512-8_3

    Chapter  Google Scholar 

  6. Lukas, J., Fridrich, J., Goljan, M.: Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2), 205–214 (2006)

    Article  Google Scholar 

  7. Sanlyde, D., Skorobogatov, S., Anderson, R., Quisquater, J.-J.: On a new way to read data from memory. In: Proceedings of the First International IEEE Security in Storage Workshop, pp. 65–69 (2002)

    Google Scholar 

  8. Choi, P., Kim, D.K.: Design of security enhanced TPM chip against invasive physical attacks. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1787–1790 (2012)

    Google Scholar 

  9. Herder, C., Yu, M.-D., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126–1141 (2014)

    Article  Google Scholar 

  10. Shokrollahi, J., Martin, C.: Method for Authenticating a Charge-Coupled Device (CCD). Patent No. 8817123 (2014)

    Google Scholar 

  11. Cao, Y., Zhang, L., Zalivaka, S.S., Chang, C.-H., Chen, S.: CMOS image sensor based physical unclonable function for coherent sensor-level authentication. IEEE Trans. Circ. Syst. I Regul. Pap. 62(11), 2629–2640 (2015)

    Article  MathSciNet  Google Scholar 

  12. Haider, I., Höberl, M. Rinner, B.: Trusted sensors for participatory sensing and IoT applications based on physically unclonable functions. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 14–21 (2016)

    Google Scholar 

  13. Prada-Delgado, M.A., Vázquez-Reyes, A., Baturone, I.: Trustworthy firmware update for Internet-of-Thing devices using physical unclonable functions. In: Global IoT Summit, (2017)

    Google Scholar 

  14. Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.-J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Secur. 2008, 1–18 (2008)

    Article  Google Scholar 

  15. Jeon, Y., Kim, Y., Kim, J.: Implementation of a video streaming security system for smart device. In: IEEE International Conference on Consumer Electronics (ICCE), pp. 97–100 (2014)

    Google Scholar 

  16. National Institute of Standards and Technology: Recommendations for Block Cipher Modes of Operation. NIST Special Publication 800-38A (2001)

    Google Scholar 

  17. Souyah, A., Faraoun, K.M.: A review on different image encryption approaches. In: Chikhi, S., Amine, A., Chaoui, A., Kholladi, M.K., Saidouni, D.E. (eds.) Modelling and Implementation of Complex Systems. LNNS, vol. 1, pp. 3–18. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33410-3_1

    Chapter  Google Scholar 

  18. Caragata, D., Mucarquer, J.A., Koscina, M., El Assad, S.: Cryptanalysis of an improved fragile watermarking scheme. AEU Int. J. Electron. Commun. 70(6), 777–785 (2016)

    Article  Google Scholar 

  19. Baturone, I., Prada-Delgado, M.A., Eiroa, S.: Improved generation of identifiers, secret keys, and random numbers from SRAMs. IEEE Trans. Inf. Forensics Secur. 10(12), 2653–2668 (2015)

    Article  Google Scholar 

  20. Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)

    Article  MathSciNet  Google Scholar 

  21. Prada-Delgado, M.A., Vázquez-Reyes, A., Baturone, I.: Physical unclonable keys for smart lock systems using bluetooth low energy. In: 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON), pp. 4808–4813 (2016)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by TEC2014-57971-R project from Ministerio de Economía y Competitividad of the Spanish Government (with support from the PO FEDER-FSE) and 201750E010 (HW-SEEDS) project from CSIC. The work of Miguel A. Prada-Delgado was supported by V Plan Propio de Investigación through the University of Seville, Seville, Spain.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rosario Arjona .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arjona, R., Prada-Delgado, M.A., Arcenegui, J., Baturone, I. (2018). Using Physical Unclonable Functions for Internet-of-Thing Security Cameras. In: Fortino, G., et al. Interoperability, Safety and Security in IoT. InterIoT SaSeIoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242. Springer, Cham. https://doi.org/10.1007/978-3-319-93797-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93797-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93796-0

  • Online ISBN: 978-3-319-93797-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics