[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

Security protocols play a pivotal role in transmitting the sensitive application data through packet switched and circuit switched data communication. State-of-the-art research comes up with the constrained IoT design to provide the connectivity in between things without any human intervention. Hence, IoT becomes a promising solution to provide the end-to-end connectivity through constrained network resources. Physical Unclonable Function (PUF) is a digital logic design that is incorporated in Integrated Circuit (IC). It is lightweight, unclonable, and simple to implement. Security mechanisms based on PUF can be an efficient way to provide security for resource-constrained IoT networks. This chapter describes different security aspects/scenarios of IoT that can use PUF-based mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 143.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 179.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., & Struik, R. (2013, September). Security considerations in the IP-based internet of things. Draft-garcia-core-security-06 (work in progress).

    Google Scholar 

  2. Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., & Richardson, M. (2014, October). A security threat analysis for routing protocol for low-power and lossy networks (RPL). Draft-ietf-roll-security-threats-11 (work in progress).

    Google Scholar 

  3. Sarikaya, B., Sethi, M., & Garcia-Carillo, D. (2018, September). Secure IoT bootstrapping: A survey. Draft-sarikaya-t2trg-sbootstrapping-05 (work in progress).

    Google Scholar 

  4. Ruhrmair, U., Solter, J., Sehnke, F., Xu, X., Mahmoud, A., et al. (2013). PUF modelling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security, 8(11), 1876–1891.

    Article  Google Scholar 

  5. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global.

    Book  Google Scholar 

  6. Edward Suh, G., & Devadas, S. (2007). Physical Unclonable Functions for device authentication and secret key generation. In Proceedings of the 44th annual design automation conference (pp. 644–654). ACM.

    Google Scholar 

  7. Meng-Day Y., M’Raihi, D., Sowell, R., & Devadas, S. (2011, October). Lightweight and secure PUF key storage using limits of machine learning. In Cryptographic Hardware and Embedded Systems, CHES 2011—13th International Workshop, Nara, Japan (pp. 358–373).

    Google Scholar 

  8. Gupta, B., Agrawal, D. P., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis.

    Google Scholar 

  9. Shamim Hossain, M., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596–606.

    Article  Google Scholar 

  10. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP., & Alexander, R. (2012, March). RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550. https://doi.org/10.17487/RFC6550. Retrieved from https://www.rfc-editor.org/info/rfc6550

  11. Bradner, S. (1997, March). Key words for use in RFCs to indicate requirement levels. BCP 14, RFC 2119. https://doi.org/10.17487/RFC2119. Retrieved from https://www.rfc-editor.org/info/rfc2119

  12. Gupta, B. B., & Quamara, M. An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, e4946.

    Google Scholar 

  13. Ruhrmair, U. (2012). SIMPL systems as a key less cryptographic and security primitive. Lecture Notes in Computer Science, 6805, 329–354.

    Article  Google Scholar 

  14. Labrado, C., & Thapliyal, H. (2018). Design of a piezoelectric based physically unclonable function for IoT security. IEEE Internet of Things Journal, 6(2) 2770–2777.

    Google Scholar 

  15. O’Neill, M. (2016). Insecurity by design: Today’s IoT device security problem. Engineering, 2(1), 48–49.

    Article  Google Scholar 

  16. Kim, S. W. (2014). Physical integrity check in wireless relay networks. In: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA (pp. 514–515).

    Google Scholar 

  17. Kasmi, O., Baina, A., & Bellafkih, M. (2016) Multi level integrity management in critical infrastructure. In 2016 11th International Conference on Intelligent Systems: Theories and Applications (SITA), Mohammedia, Morocco (pp. 1–6).

    Google Scholar 

  18. Zhang, X., Yang, X., Lin, J., Xu, G., & Yu, W. (2017, January). On data integrity attacks against real-time pricing in energy-based cyber-physical systems. IEEE Transactions on Parallel and Distributed Systems, 28(1), 170–187.

    Article  Google Scholar 

Download references

Acknowledgment

The authors hereby express their gratitude to the inventions of PUF and look forward to see its large scale adoption in securing IoT networks. Also, many thanks to the editor(s) of this book for providing a platform to introduce new security related concepts.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alkatheiri, M.S., Sangi, A.R., Anamalamudi, S. (2020). Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics