...
首页> 外文期刊>Internet of Things Journal, IEEE >Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes
【24h】

Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes

机译:带有极化代码的偏向物理不可克隆功能上的秘密密钥生成

获取原文
获取原文并翻译 | 示例
           

摘要

Internet-of-Things (IoT) devices are usually small, low cost, and have limited resources, which makes them vulnerable to physical and cloning attacks. To secure IoT devices, physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret-key generation. In this paper, we focus on designing a robust construction to derive secret keys from static random-access memory (SRAM)-PUFs, which enjoy the uniqueness and randomness properties stemming from the manufacturing variations of SRAM memory cells. We make use of a polar code construction. Based on the fact that SRAM memory can often be found in today's IoT devices, and since polar codes have been selected as error-correction technique in the fifth generation standard, this makes the proposed scheme a promising candidate for reducing the extra cost and securing resource-constrained IoT devices. In this paper, we propose a novel construction method to eliminate the effect of noise and bias in SRAM-PUFs. We shall prove that the secrecy leakage of the helper data about the secret-key can be made negligible due to polarization and proper code construction design. Results show that the proposed scheme provides a significant improvement of the reliability (achieve a failure probability below 10(-6)) and of the realizable secret-key rate, which is also evaluated by the theoretical analysis. In addition, the proposed scheme provides the possibility to tradeoff complexity, secrecy, and reliability with the same code construction for different IoT applications.
机译:物联网(IoT)设备通常体积小,成本低且资源有限,这使其容易受到物理和克隆攻击。为了保护IoT设备,物理不可克隆功能(PUF)是用于设备身份验证和特定于设备的密钥生成的相对较新的安全原语。在本文中,我们专注于设计一种健壮的结构,以从静态随机存取存储器(SRAM)-PUF派生秘密密钥,而PUF则享有SRAM存储器单元制造差异所带来的唯一性和随机性。我们利用极性代码构造。基于今天的物联网设备中经常可以找到SRAM存储器的事实,并且由于在第五代标准中选择了极性代码作为纠错技术,因此,该方案成为减少额外成本和保护资源的有希望的候选者受限的物联网设备。在本文中,我们提出了一种新颖的构造方法,以消除SRAM-PUF中的噪声和偏置影响。我们将证明,由于极化和适当的代码构造设计,有关秘密密钥的辅助数据的秘密泄漏可以忽略不计。结果表明,该方案显着提高了可靠性(实现了低于10(-6)的故障概率)和可实现的密钥率,这也得到了理论分析的评估。此外,提出的方案还提供了在不同物联网应用中使用相同代码构造来权衡复杂性,保密性和可靠性的可能性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号