Digital fingerprints for low-cost platforms using MEMS sensors

With the Internet of Things on the horizon, correct authentication of Things within a population will become one of the major concerns for security. Physical authentication, which is implementing digital fingerprints by utilizing device-unique manufacturing variations, has great potential for achieving this purpose. MEMS sensors that are used in the Internet of Things have not been explored as a source of variation. In this paper, we target a commonly used MEMS sensor, an accelerometer, and utilize its process variations to generate digital fingerprints. This is achieved by measuring the accelerometer's response to an applied electrostatic impulse and its inherent offset values. Our results revealed that MEMS sensors could be used as a source for digital fingerprints for run-time authentication applications.

[1]  R. Nance,et al.  Role of Boundary Conditions in Monte Carlo Simulation of Microelectromechanical Systems , 1998 .

[2]  D. S. Eddy,et al.  Application of MEMS technology in automotive sensors and actuators , 1998 .

[3]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[4]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[5]  Jason V. Clark,et al.  Practical Techniques for Measuring MEMS Properties , 2004 .

[6]  A. Mawardi,et al.  Design of microresonators under uncertainty , 2005, Journal of Microelectromechanical Systems.

[7]  Joshua R. Smith,et al.  Battery-free wireless identification and sensing , 2005, IEEE Pervasive Computing.

[8]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[9]  Jiming Chen,et al.  RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations , 2009 .

[10]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[11]  Patrick Schaumont,et al.  A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[12]  David Naccache,et al.  Towards Hardware-Intrinsic Security - Foundations and Practice , 2010, Information Security and Cryptography.

[13]  Ramesh Karri,et al.  Sensor physical unclonable functions , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[14]  Aikaterini Mitrokotsa,et al.  Integrated RFID and Sensor Networks: Architectures and Applications , 2010 .

[15]  Ingrid Verbauwhede,et al.  Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.

[16]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[17]  Tim Güneysu,et al.  Using Data Contention in Dual-ported Memories for Security Applications , 2010, Journal of Signal Processing Systems.

[18]  Patrick Schaumont,et al.  A novel microprocessor-intrinsic Physical Unclonable Function , 2012, 22nd International Conference on Field Programmable Logic and Applications (FPL).