【24h】

Ensuring Proof-of-Authenticity of IoT Edge Devices Using Blockchain Technology

机译:使用区块链技术确保IoT边缘设备的真实性

获取原文

摘要

Imposter devices pose serious threats. The majority of low-cost edge devices can easily be counterfeited or cloned; the supply chain is insufficiently secure. Reliability of deployed devices can be called into question simply because they might be counterfeit or cloned. It is a must to identify edge devices' sourcing uniquely and verify their validity periodically at runtime. We integrate blockchain technology to authenticate resource-constrained, low-cost edge devices. We use SRAM-based physically unclonable functions (PUFs)to generate unique “digital fingerprints” (device IDs). Registered manufacturers upload a cryptographic hash of each device ID to a “globally accessible” blockchain instance (key-value store or smart contract). While registering/designating a device locally, the end-user verifies whether the hash is present in that blockchain. We utilize a “locally permissioned” blockchain infrastructure (which is still a globally managed blockchain or, in future, a sidechain)to authenticate edge devices for a defense-in-depth approach. Devices can authenticated periodically to prevent device cloning. Target environments can be large and have varied trust among users and lack a specific perimeter; this “local” blockchain methodology is thus pertinent, especially since blockchains gain security over time. Our approach reduces the potential for classes of information leakage and types of sabotage in a critical infrastructure or large-scale deployment (such as a smart city)arising from imposter devices. This methodology protects against such imposters in mobile settings within an IoT infrastructure too.
机译:冒名顶替者的设备构成了严重威胁。大多数低成本边缘设备很容易被伪造或克隆;供应链的安全性不足。可以简单地质疑已部署设备的可靠性,因为它们可能是伪造或克隆的。必须唯一地标识边缘设备的来源,并在运行时定期验证其有效性。我们集成了区块链技术以验证资源受限的低成本边缘设备。我们使用基于SRAM的物理不可克隆功能(PUF)生成唯一的“数字指纹”(设备ID)。注册的制造商将每个设备ID的加密哈希值上传到“全球可访问”的区块链实例(键值存储或智能合约)。最终用户在本地注册/指定设备时,将验证该区块链中是否存在哈希。我们利用“本地许可”的区块链基础架构(仍然是全球托管的区块链,或者将来是侧链)来对边缘设备进行身份验证,以进行深度防御。设备可以定期进行身份验证,以防止设备克隆。目标环境可能很大,并且用户之间的信任度不同,并且缺乏特定的范围;因此,这种“本地”区块链方法学是相关的,特别是因为随着时间的流逝,区块链获得了安全性。我们的方法减少了因冒名顶替者而引发的关键基础架构或大规模部署(例如智能城市)中信息泄漏类别和破坏类型的可能性。这种方法论还可以防止物联网基础架构中移动环境中的此类冒名顶替者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号