Skip to main content

2019 | OriginalPaper | Buchkapitel

Evaluation of Software PUF Based on Gyroscope

verfasst von : Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki

Erschienen in: Information Security Practice and Experience

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Physically Unclonable Function (PUF), which extracts a unique device identification based on variations in manufacturing processes, has recently attracted attention. IoT devices, including sensor monitors and wearables, have come into widespread use, and various kinds of devices have access to a range of services. Device authentication and management of key to encryption communication data are essential for a secure service. We can realize secure authentication based on device identification extracted by a PUF. For example, PUF is used as a key generator to avoid storing the encryption key in a device. However, existing PUFs require dedicated hardware or software (driver) to extract device identification. Thus, it may not be possible to apply existing PUFs to IoT devices in a situation where there are a variety of devices and many device manufacturers. We can use characteristic values of existing sensors in an IoT device as an alternative to PUF. In this paper, we expand an existing software PUF based to support characteristic values extract from a gyroscope, and evaluate the entropy and robustness. We found that the same device identifier can be reliably extracted from a gyroscope even under conditions of high and low temperature, and low-pressure. No changes in the characteristic values of the gyroscope due to degradation with age were found over a wearing period exceeding than three years. The device identifier has up to 81.2 bits entropy with no error-correcting mechanism. It has up to 57.7 bits entropy when error-correction of one bit is applied to each characteristic value by a Fuzzy extractor.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
11.
Zurück zum Zitat Gassend, B., Clarke, D., Lim, D., van Dijk, M., Devada, S.: Identification and authentication of integrated circuits. Concurrency Comput.: Practice Exp. 16(11), 1077–1098 (2004)CrossRef Gassend, B., Clarke, D., Lim, D., van Dijk, M., Devada, S.: Identification and authentication of integrated circuits. Concurrency Comput.: Practice Exp. 16(11), 1077–1098 (2004)CrossRef
16.
Zurück zum Zitat Hidano, S., Ohki, T., Takahashi, K.: Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. In: Proceedings of 2012 International Conference of the Biometrics Special Interest Group, BIOSIG, pp. 1–6 (2012) Hidano, S., Ohki, T., Takahashi, K.: Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. In: Proceedings of 2012 International Conference of the Biometrics Special Interest Group, BIOSIG, pp. 1–6 (2012)
17.
Zurück zum Zitat Hidano, S., Ohki, T., Komatsu, N., Takahashi, K.: A metric of identification performance of biometrics based on information content. In: Proceedings of 11th International Conference on Control, Automation, Robotics and Vision, ICARCV 2010, pp. 1274–1279 (2010). https://doi.org/10.1109/ICARCV.2010.5707961 Hidano, S., Ohki, T., Komatsu, N., Takahashi, K.: A metric of identification performance of biometrics based on information content. In: Proceedings of 11th International Conference on Control, Automation, Robotics and Vision, ICARCV 2010, pp. 1274–1279 (2010). https://​doi.​org/​10.​1109/​ICARCV.​2010.​5707961
19.
Zurück zum Zitat Keller, C., Gurkaynak, F., Kaeslin, H., Felber, N.: Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers. In: Proceedings of IEEE International Symposium on Circuits and Systems, vol. 3, pp. 2740–2743 (2014). https://doi.org/10.1109/ISCAS.2014.6865740 Keller, C., Gurkaynak, F., Kaeslin, H., Felber, N.: Dynamic memory-based physically unclonable function for the generation of unique identifiers and true random numbers. In: Proceedings of IEEE International Symposium on Circuits and Systems, vol. 3, pp. 2740–2743 (2014). https://​doi.​org/​10.​1109/​ISCAS.​2014.​6865740
20.
23.
25.
Zurück zum Zitat Lee, J., Lim, D.L.D., Gassend, B., Suh, G., Dijk, M.V., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of 2004 Symposium on VLSI Circuits, pp. 176–179 (2004). https://doi.org/10.1109/VLSIC.2004.1346548 Lee, J., Lim, D.L.D., Gassend, B., Suh, G., Dijk, M.V., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: Proceedings of 2004 Symposium on VLSI Circuits, pp. 176–179 (2004). https://​doi.​org/​10.​1109/​VLSIC.​2004.​1346548
26.
Zurück zum Zitat Liu, W., Zhang, Z., Li, M., Liu, Z.: A trustworthy key generation prototype based on DDR3 PUF for wireless sensor networks. In: Proceedings of 2014 International Symposium on Computer, Consumer and Control, IS3C 2014, pp. 706–709 (2014). https://doi.org/10.1109/IS3C.2014.188 Liu, W., Zhang, Z., Li, M., Liu, Z.: A trustworthy key generation prototype based on DDR3 PUF for wireless sensor networks. In: Proceedings of 2014 International Symposium on Computer, Consumer and Control, IS3C 2014, pp. 706–709 (2014). https://​doi.​org/​10.​1109/​IS3C.​2014.​188
29.
Zurück zum Zitat Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. ISC, pp. 3–37. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14452-3_1 Maes, R., Verbauwhede, I.: Physically unclonable functions: a study on the state of the art and future research directions. In: Sadeghi, A.R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security. ISC, pp. 3–37. Springer, Heidelberg (2010). https://​doi.​org/​10.​1007/​978-3-642-14452-3_​1
36.
Zurück zum Zitat Tehranipoor, F., Karimina, N., Xiao, K., Chandy, J.: DRAM based intrinsic physical unclonable functions for system level security. In: Proceedings of the 25th edition on Great Lakes Symposium on VLSI, GLSVLSI 2015, pp. 15–20 (2015). https://doi.org/10.1145/2742060.2742069 Tehranipoor, F., Karimina, N., Xiao, K., Chandy, J.: DRAM based intrinsic physical unclonable functions for system level security. In: Proceedings of the 25th edition on Great Lakes Symposium on VLSI, GLSVLSI 2015, pp. 15–20 (2015). https://​doi.​org/​10.​1145/​2742060.​2742069
39.
40.
Metadaten
Titel
Evaluation of Software PUF Based on Gyroscope
verfasst von
Kazuhide Fukushima
Ayumu Yoshimura
Shinsaku Kiyomoto
Norikazu Yamasaki
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-34339-2_13

Premium Partner