A Survey on Physical Unclonable Function (PUF)-based Security Solutions for Internet of Things.

作者: Sherali Zeadally , Fatemeh Afghah , Ashwija Korenda , Alireza Shamsoshoara

DOI:

关键词: AuthenticationComputer securityComputer sciencePhysical unclonable functionInternet of ThingsCryptographyKey generationDomain (software engineering)Identification (information)

摘要: The vast areas of applications for IoTs in future smart cities, transportation systems, and so on represent a thriving surface several security attacks with economic, environmental societal impacts. This survey paper presents review the challenges emerging IoT networks discusses some their countermeasures based different domains networks. Most conventional solutions are adopted from communication while noting particular characteristics such as nodes quantity, heterogeneity, limited resources nodes, these methods not adequate. One challenge toward utilizing common secret key-based cryptographic large-scale is problem key generation, distribution, storage protecting keys physical attacks. Physically unclonable functions (PUFs) can be utilized possible hardware remedy identification authentication IoTs. Since PUFs extract unique characteristics, they potentially offer an affordable practical solution generation. However, barriers limit PUFs' generation purposes. We discuss advantages PUF-based methods, we present state-of-the-art techniques this domain. also proof-of-concept using resistive random-access memories (ReRAM) embedded

参考文章(171)
Hyunho Kang, Yohei Hori, Toshihiro Katashita, Manabu Hagiwara, Keiichi Iwamura, Performance Analysis for PUF Data Using Fuzzy Extractor 8th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2013. pp. 277- 284 ,(2014) , 10.1007/978-3-642-41671-2_36
Dominik Merli, Dieter Schuster, Frederic Stumpf, Georg Sigl, Side-channel analysis of PUFs and fuzzy extractors trust and trustworthy computing. pp. 33- 47 ,(2011) , 10.1007/978-3-642-21599-5_3
Geert Jan Schrijen, Pim Tuyls, Jorge Guajardo, Roel Maes, Sandeep S. Kumar, The Butterfly PUF: Protecting IP on every FPGA. hardware-oriented security and trust. pp. 67- 70 ,(2008)
Farinaz Koushanfar, Hardware Metering: A Survey Introduction to Hardware Security and Trust. pp. 103- 122 ,(2012) , 10.1007/978-1-4419-8080-9_5
Pankaj Rohatgi, Electromagnetic Attacks and Countermeasures Cryptographic Engineering. pp. 407- 430 ,(2009) , 10.1007/978-0-387-71817-0_15
Ulrich Rührmair, Srinivas Devadas, Farinaz Koushanfar, Security Based on Physical Unclonability and Disorder Introduction to Hardware Security and Trust. pp. 65- 102 ,(2012) , 10.1007/978-1-4419-8080-9_4
Michael Mealling, Rich Salz, Paul J. Leach, A Universally Unique IDentifier (UUID) URN Namespace RFC. ,vol. 4122, pp. 1- 32 ,(2005)
Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Amir-Mohammad Rahmani, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho, Hannu Tenhunen, SEA: A Secure and Efficient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways Procedia Computer Science. ,vol. 52, pp. 452- 459 ,(2015) , 10.1016/J.PROCS.2015.05.013
Xue Yang, Zhihua Li, Zhenmin Geng, Haitao Zhang, A Multi-layer Security Model for Internet of Things Springer, Berlin, Heidelberg. pp. 388- 393 ,(2012) , 10.1007/978-3-642-32427-7_54
Aditya Gaur, Bryan Scotney, Gerard Parr, Sally McClean, Smart City Architecture and its Applications Based on IoT Procedia Computer Science. ,vol. 52, pp. 1089- 1094 ,(2015) , 10.1016/J.PROCS.2015.05.122