Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security

This article provides a secret key extraction aided by wireless transceiver for Internet of Things (IoT) based consumer electronic (CE) devices, which can be a promising alternative to the conventional secret storage with non-volatile memory. Exploiting the wireless transceiver as a source of secret key generation, we propose a new type of static random access memory (SRAM) physically unclonable function (PUF), especially focusing on run-time extraction from most connected CE devices without additional hardware. The response of the proposed PUF is further processed by a fuzzy extractor to reproduce the secure key, where we suggest to use low-complexity convolutional code combined with interleaver for error correction. In addition, run-time multiple readout capability of our wireless transceiver aided PUF enables to provide a helper data-less key reproduction scheme to reduce leaked information and implementation complexity. Experimental results on two platforms equipped with the IEEE 802.11 Wi-Fi and IEEE 802.15.4g Smart Utility Network (SUN) based wireless transceivers confirm that the proposed PUF and key reproduction schemes successfully generate the secret key at any time, which makes our approach easily applicable to various IoT based CE devices with security requirements.

[1]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.

[2]  Frans M. J. Willems,et al.  Secure Key Generation from Biased PUFs , 2015, CHES.

[3]  Srinivas Devadas,et al.  Security Based on Physical Unclonability and Disorder , 2012 .

[4]  Srinivas Devadas,et al.  Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.

[5]  John Ross Wallrabenstein Practical and Secure IoT Device Authentication Using Physical Unclonable Functions , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[6]  Srinivas Devadas,et al.  Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.

[7]  Jaeyoung Kim,et al.  A fully integrated ieee IEEE 802.15.4g MR-FSK SoC soc for smart utility network applications , 2014, IEEE Transactions on Consumer Electronics.

[8]  Geert Jan Schrijen,et al.  Comparative analysis of SRAM memories used as PUF primitives , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[9]  Yousung Kang,et al.  Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices , 2018, 2018 IEEE SENSORS.

[10]  Martin Bossert,et al.  Using Convolutional Codes for Key Extraction in Physical Unclonable Functions , 2017, ArXiv.

[11]  Woong Choi,et al.  A DRAM based physical unclonable function capable of generating >1032 Challenge Response Pairs per 1Kbit array for secure chip authentication , 2017, 2017 IEEE Custom Integrated Circuits Conference (CICC).

[12]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[13]  Mahesh Sooriyabandara,et al.  Low Power Wide Area Networks: An Overview , 2016, IEEE Communications Surveys & Tutorials.

[14]  Lilian Bossuet,et al.  Design, Evaluation, and Optimization of Physical Unclonable Functions Based on Transient Effect Ring Oscillators , 2016, IEEE Transactions on Information Forensics and Security.

[15]  Sajad Shirali-Shahreza,et al.  Protecting Home User Devices with an SDN-Based Firewall , 2018, IEEE Transactions on Consumer Electronics.

[16]  Tim Güneysu,et al.  Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things , 2017, IEEE Access.

[17]  Patrick Schaumont,et al.  A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[18]  M. Bossert,et al.  Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable Functions , 2017 .

[19]  M. Aman Physical Unclonable Functions for IoT Security , 2016 .

[20]  Akashi Satoh,et al.  Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs , 2010, 2010 International Conference on Reconfigurable Computing and FPGAs.

[21]  Muhammad Khurram Khan,et al.  Communal Acts of IoT Consumers: A Potential Threat to Security and Privacy , 2019, IEEE Transactions on Consumer Electronics.

[22]  Daya Gupta,et al.  NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access , 2018, IEEE Transactions on Consumer Electronics.

[23]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[24]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[25]  Deepak Puthal,et al.  PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things , 2019, IEEE Transactions on Consumer Electronics.

[26]  Martin Bossert,et al.  On Error Correction for Physical Unclonable Functions , 2015, ArXiv.

[27]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[28]  Lilian Bossuet,et al.  Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[29]  Mahmoud Elkhodr,et al.  Emerging Wireless Technologies in the Internet of Things: a Comparative Study , 2016, ArXiv.

[30]  Stefan Katzenbeisser,et al.  Run-Time Accessible DRAM PUFs in Commodity Devices , 2016, CHES.

[31]  Takafumi Aoki,et al.  Quaternary Debiasing for Physically Unclonable Functions , 2018, 2018 IEEE 48th International Symposium on Multiple-Valued Logic (ISMVL).

[32]  Dooho Choi,et al.  Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).