PUF-derived IoT identities in a zero-knowledge protocol for blockchain

Abstract As the internet of things moves into increasingly sensitive domains, connected devices need to be secured against data manipulation and counterfeiting. Where the underlying business processes involve multiple independent parties, a blockchain platform can provide a common source of truth. If changes to the common state depend on IoT devices, the authenticity and integrity of the IoT input must be ensured. Employing a blockchain platform for authenticating devices makes the process independent of the device manufacturer. This paper shows how cryptographic keys derived from a device’s physical fingerprint can be employed in a zero-knowledge protocol to authenticate a device. As the keys are regenerated at boot time rather than stored, the approach does not need an expensive secure element. An efficient implementation enables even lightweight devices to prove their identity and sign messages. Experimental results demonstrate the robustness of the approach.

[1]  R. Grubbs,et al.  Synthesis of isocyanate-based brush block copolymers and their rapid self-assembly to infrared-reflecting photonic crystals. , 2012, Journal of the American Chemical Society.

[2]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[3]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[4]  Maximilian Hofer,et al.  Physical Unclonable Functions in Theory and Practice , 2012 .

[5]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[6]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[7]  Iluminada Baturone,et al.  Physical unclonable keys for smart lock systems using Bluetooth Low Energy , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.

[8]  Dawu Gu,et al.  On the Robustness of Learning Parity with Noise , 2016, ICICS.

[9]  Tim Güneysu,et al.  Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things , 2017, IEEE Access.

[10]  Srinivas Devadas,et al.  FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise , 2017, Cryptogr..

[11]  Srinivas Devadas,et al.  Silicon physical random functions , 2002, CCS '02.

[12]  Krzysztof Pietrzak,et al.  Cryptography from Learning Parity with Noise , 2012, SOFSEM.

[13]  Iluminada Baturone,et al.  A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes , 2018, Sensors.

[14]  Srinivas Devadas,et al.  Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions , 2017, IEEE Transactions on Dependable and Secure Computing.

[15]  Ujjwal Guin,et al.  Invasion of the hardware snatchers , 2017, IEEE Spectrum.

[16]  John Kelsey,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .

[17]  Roel Maes,et al.  Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.

[18]  Lidong Chen,et al.  Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .

[19]  Stephan Krenn,et al.  Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise , 2012, ASIACRYPT.

[20]  Ingrid Verbauwhede,et al.  Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.

[21]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[22]  Bharadwaj Veeravalli,et al.  Blockchain-based decentralized content trust for docker images , 2017, Multimedia Tools and Applications.

[23]  Iluminada Baturone,et al.  Improved Generation of Identifiers, Secret Keys, and Random Numbers From SRAMs , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Damien Sauveron,et al.  Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[25]  Emmanuel Delamarche,et al.  High-Content Optical Codes for Protecting Rapid Diagnostic Tests from Counterfeiting. , 2018, Analytical chemistry.

[26]  Jinjun Chen,et al.  Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..

[27]  Elaine B. Barker,et al.  Recommendation for Cryptographic Key Generation , 2012 .

[28]  Nir Kshetri,et al.  1 Blockchain's roles in meeting key supply chain management objectives , 2018, Int. J. Inf. Manag..