Abstract
Security protocols play a pivotal role in transmitting the sensitive application data through packet switched and circuit switched data communication. State-of-the-art research comes up with the constrained IoT design to provide the connectivity in between things without any human intervention. Hence, IoT becomes a promising solution to provide the end-to-end connectivity through constrained network resources. Physical Unclonable Function (PUF) is a digital logic design that is incorporated in Integrated Circuit (IC). It is lightweight, unclonable, and simple to implement. Security mechanisms based on PUF can be an efficient way to provide security for resource-constrained IoT networks. This chapter describes different security aspects/scenarios of IoT that can use PUF-based mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Garcia-Morchon, O., Kumar, S., Keoh, S., Hummen, R., & Struik, R. (2013, September). Security considerations in the IP-based internet of things. Draft-garcia-core-security-06 (work in progress).
Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., & Richardson, M. (2014, October). A security threat analysis for routing protocol for low-power and lossy networks (RPL). Draft-ietf-roll-security-threats-11 (work in progress).
Sarikaya, B., Sethi, M., & Garcia-Carillo, D. (2018, September). Secure IoT bootstrapping: A survey. Draft-sarikaya-t2trg-sbootstrapping-05 (work in progress).
Ruhrmair, U., Solter, J., Sehnke, F., Xu, X., Mahmoud, A., et al. (2013). PUF modelling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security, 8(11), 1876–1891.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global.
Edward Suh, G., & Devadas, S. (2007). Physical Unclonable Functions for device authentication and secret key generation. In Proceedings of the 44th annual design automation conference (pp. 644–654). ACM.
Meng-Day Y., M’Raihi, D., Sowell, R., & Devadas, S. (2011, October). Lightweight and secure PUF key storage using limits of machine learning. In Cryptographic Hardware and Embedded Systems, CHES 2011—13th International Workshop, Nara, Japan (pp. 358–373).
Gupta, B., Agrawal, D. P., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis.
Shamim Hossain, M., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596–606.
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, JP., & Alexander, R. (2012, March). RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550. https://doi.org/10.17487/RFC6550. Retrieved from https://www.rfc-editor.org/info/rfc6550
Bradner, S. (1997, March). Key words for use in RFCs to indicate requirement levels. BCP 14, RFC 2119. https://doi.org/10.17487/RFC2119. Retrieved from https://www.rfc-editor.org/info/rfc2119
Gupta, B. B., & Quamara, M. An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, e4946.
Ruhrmair, U. (2012). SIMPL systems as a key less cryptographic and security primitive. Lecture Notes in Computer Science, 6805, 329–354.
Labrado, C., & Thapliyal, H. (2018). Design of a piezoelectric based physically unclonable function for IoT security. IEEE Internet of Things Journal, 6(2) 2770–2777.
O’Neill, M. (2016). Insecurity by design: Today’s IoT device security problem. Engineering, 2(1), 48–49.
Kim, S. W. (2014). Physical integrity check in wireless relay networks. In: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA (pp. 514–515).
Kasmi, O., Baina, A., & Bellafkih, M. (2016) Multi level integrity management in critical infrastructure. In 2016 11th International Conference on Intelligent Systems: Theories and Applications (SITA), Mohammedia, Morocco (pp. 1–6).
Zhang, X., Yang, X., Lin, J., Xu, G., & Yu, W. (2017, January). On data integrity attacks against real-time pricing in energy-based cyber-physical systems. IEEE Transactions on Parallel and Distributed Systems, 28(1), 170–187.
Acknowledgment
The authors hereby express their gratitude to the inventions of PUF and look forward to see its large scale adoption in securing IoT networks. Also, many thanks to the editor(s) of this book for providing a platform to introduce new security related concepts.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Alkatheiri, M.S., Sangi, A.R., Anamalamudi, S. (2020). Physical Unclonable Function (PUF)-Based Security in Internet of Things (IoT): Key Challenges and Solutions. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)