A PUF-based cryptographic security solution for IoT systems on chip

The integration of multicore processors and peripherals from multiple intellectual property core providers as hardware components of IoT multiprocessor systems-on-chip (SoC) represents a source of security vulnerabilities for the in-chip communication. This paper describes the concept and the practical results of a SoC security implementation that is illustrative for IoT applications. The mechanism employed in this approach uses physically unclonable functions (PUF) and symmetric cryptography in order to encrypt the transferred messages within the SoC between the microprocessor and its peripherals. The mechanism is experimentally validated at FPGA level, the paper describing also an implementation scenario for an IoT ARM based device.

[1]  Shreyas Sen,et al.  RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[2]  Simha Sethumadhavan,et al.  Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property , 2013, IEEE Design & Test.

[3]  Debdeep Mukhopadhyay,et al.  A PUF-Based Secure Communication Protocol for IoT , 2017, IACR Cryptol. ePrint Arch..

[4]  Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things , 2017, SpaCCS Workshops.

[5]  An Braeken,et al.  PUF Based Authentication Protocol for IoT , 2018, Symmetry.

[6]  István Z. Kovács,et al.  Coverage and Capacity Analysis of Sigfox, LoRa, GPRS, and NB-IoT , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[7]  Seung-Hoon Hwang,et al.  A survey on LPWA technology: LoRa and NB-IoT , 2017, ICT Express.

[8]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[9]  Ingrid Verbauwhede,et al.  Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions , 2010, Towards Hardware-Intrinsic Security.

[10]  Jean-Christophe Prévotet,et al.  ARM-FPGA-based platform for reconfigurable wireless communication systems using partial reconfiguration , 2017, EURASIP J. Embed. Syst..

[11]  Hilde van der Togt,et al.  Publisher's Note , 2003, J. Netw. Comput. Appl..

[12]  Antonino Mazzeo,et al.  Authenticating IoT Devices with Physically Unclonable Functions Models , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[13]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[14]  Maurizio Murroni,et al.  IoT architecture for multisensorial media , 2017, 2017 IEEE URUCON.

[15]  Bernd Klauer,et al.  Hardware Based Security Enhanced Direct Memory Access , 2013, Communications and Multimedia Security.

[16]  Andrew Huang,et al.  Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.

[17]  M. Aman Physical Unclonable Functions for IoT Security , 2016 .

[18]  Marcian N. Cirstea,et al.  Analysis and Evaluation of PUF-Based SoC Designs for Security Applications , 2016, IEEE Transactions on Industrial Electronics.

[19]  Lilian Bossuet,et al.  Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[20]  JinYier,et al.  Hardware Trojans in Wireless Cryptographic ICs , 2010 .

[21]  Patrick Stewin,et al.  Detecting peripheral-based attacks on the host memory , 2014 .

[22]  Alec Wolman,et al.  Protecting Data on Smartphones and Tablets from Memory Attacks , 2015, ASPLOS.

[23]  Yiorgos Makris,et al.  Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.