首页> 外文会议>International Conference on P2P, Parallel, Grid, Cloud and Internet Computing >Authenticating IoT Devices with Physically Unclonable Functions Models
【24h】

Authenticating IoT Devices with Physically Unclonable Functions Models

机译:使用物理上无法克隆的功能模型对IoT设备进行身份验证

获取原文

摘要

Wirelessly connected smart embedded devices, forming the so called Internet of Things network, have achieved unprecedented levels of diffusion as they are adopted in many application domains, ranging from goods transportation to eHealth monitoring infrastructure. As they are always inherently connected, hence exposed to attacks, and as they densely populate our daily life collecting, managing and elaborating data, security has drawn a lot of attention in the literature. In a crowded network, classical security approaches may be not adequate, since they require secret sharing or public key distribution infrastructures. Physically Unclonable Functions (PUFs), introduced so far, are exploitable as security primitives, providing easy authentication and secure key storage mechanisms. Traditional PUF authentication schemes rely on the enrollment of some challenge/response pairs (CRPs), extracted before each device is issued, as it is not feasible to retrieve the whole CRPs set. Moreover, accomplishing such a procedure may introduce a significant overhead due to the cardinality of extracted CRPs and due to size of the device population. To avoid these issues, in this paper we exploit the knowledge of a PUF model in order to make available the whole CRPs set, and, by adopting an encryption scheme, we hide it to avoid model based attacks which can be performed on CRPs sent in clear. To this aim, we show an implementation based on the Anderson PUF and on AES, realized on a Xilinx Zynq-7000 Field Programmable Gate Array.
机译:无线连接的智能嵌入式设备形成了所谓的物联网网络,已经实现了前所未有的扩散水平,因为它们已在从货物运输到电子卫生保健监控基础设施的许多应用领域中得到采用。由于它们始终是固有的连接,因此容易受到攻击,并且由于它们在我们的日常生活中密集地收集,管理和完善数据,因此安全性在文献中引起了很多关注。在拥挤的网络中,传统的安全方法可能不够用,因为它们需要秘密共享或公钥分发基础结构。到目前为止引入的物理上不可克隆的功能(PUF)可作为安全原语加以利用,提供简单的身份验证和安全的密钥存储机制。传统的PUF身份验证方案依赖于在每个设备发出之前提取的一些质询/响应对(CRP)的注册,因为检索整个CRP集是不可行的。而且,由于所提取的CRP的基数以及设备数量的原因,完成这样的过程可能会引入大量开销。为了避免这些问题,在本文中,我们利用PUF模型的知识来提供整个CRP集,并且通过采用加密方案,我们将其隐藏起来,以避免可以对发送给CRP的CRP执行基于模型的攻击。清除。为此,我们展示了基于Anderson PUF和AES的实现,该实现是在Xilinx Zynq-7000现场可编程门阵列上实现的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号