Skip to main content

2016 | OriginalPaper | Buchkapitel

How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs

verfasst von : Domenico Amelino, Mario Barbareschi, Ermanno Battista, Antonino Mazzeo

Erschienen in: Intelligent Interactive Multimedia Systems and Services 2016

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A wide spectrum of security challenges were arose by Wireless Sensor Network (WSN) architectures and common security techniques used in traditional networks are impractical. In particular, being the sensor nodes often deployed in unattended areas, physical attacks are possible and have to be taken into account during the architecture design. Whenever an attacker enters in possession of a node, he/she can jeopardize the network by extracting cryptographic keys used for secure communication. Moreover, an attacker can also try to brute force the keys, hence they should be fully random and hard to guess. In this paper, we propose a novel solution based on generating keys from unique physical characteristics of a node integrated circuit without requiring additional hardware compared to common WSN node architectures. To this aim, we exploit the Static Random Access Memory based Physically Unclonable Functions and we show their applicability to the WSN by implementing a working prototype based on the STM32F4 microcontroller.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The Reed-Muller ECC has a (128,8,63) configuration, which has probability error of 4.321086e-09.
 
2
The device goes into standby mode to power down the SRAM, before rebooting.
 
Literatur
1.
Zurück zum Zitat Albanese, M., Battista, E., Jajodia, S., Casola, V.: Manipulating the attacker’s view of a system’s attack surface. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 472–480. IEEE (2014) Albanese, M., Battista, E., Jajodia, S., Casola, V.: Manipulating the attacker’s view of a system’s attack surface. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 472–480. IEEE (2014)
2.
Zurück zum Zitat Amato, F., Chianese, A., Moscato, V., Picariello, A., Sperli, G.: Snops: A Smart Environment for Cultural Heritage Applications, pp. 49–56 (2012) Amato, F., Chianese, A., Moscato, V., Picariello, A., Sperli, G.: Snops: A Smart Environment for Cultural Heritage Applications, pp. 49–56 (2012)
3.
Zurück zum Zitat Amato, F., Mazzeo, A., Moscato, V., Picariello, A.: Exploiting cloud technologies and context information for recommending touristic paths. Stud. Comput. Intell. 511, 281–287 (2014)CrossRef Amato, F., Mazzeo, A., Moscato, V., Picariello, A.: Exploiting cloud technologies and context information for recommending touristic paths. Stud. Comput. Intell. 511, 281–287 (2014)CrossRef
4.
Zurück zum Zitat Anderson, J.H.: A puf design for secure fpga-based embedded systems. In: Proceedings of Asia and South Pacific Design Automation Conference, pp. 1–6. IEEE Press (2010) Anderson, J.H.: A puf design for secure fpga-based embedded systems. In: Proceedings of Asia and South Pacific Design Automation Conference, pp. 1–6. IEEE Press (2010)
5.
Zurück zum Zitat Barbareschi, M., Bagnasco, P., Mazzeo, A.: Supply voltage variation impact on anderson puf quality. In: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1–6. IEEE (2015) Barbareschi, M., Bagnasco, P., Mazzeo, A.: Supply voltage variation impact on anderson puf quality. In: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1–6. IEEE (2015)
6.
Zurück zum Zitat Barbareschi, M., Battista, E., Mazzeo, A., Mazzocca, N.: Testing 90 nm microcontroller sram puf quality. In: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1–6. IEEE (2015) Barbareschi, M., Battista, E., Mazzeo, A., Mazzocca, N.: Testing 90 nm microcontroller sram puf quality. In: 2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), pp. 1–6. IEEE (2015)
7.
Zurück zum Zitat Barbareschi, M., Battista, E., Mazzeo, A., Venkatesan, S.: Advancing wsn physical security adopting tpm-based architectures. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 394–399. IEEE (2014) Barbareschi, M., Battista, E., Mazzeo, A., Venkatesan, S.: Advancing wsn physical security adopting tpm-based architectures. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 394–399. IEEE (2014)
8.
Zurück zum Zitat Battista, E., Casola, V., Mazzeo, A., Mazzocca, N.: Siren: a feasible moving target defence framework for securing resource-constrained embedded nodes. Int. J. Crit. Comput.-Based Syst. 4(4), 374–392 (2013)CrossRef Battista, E., Casola, V., Mazzeo, A., Mazzocca, N.: Siren: a feasible moving target defence framework for securing resource-constrained embedded nodes. Int. J. Crit. Comput.-Based Syst. 4(4), 374–392 (2013)CrossRef
9.
Zurück zum Zitat Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, p. 175. ACM (2015) Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference, p. 175. ACM (2015)
10.
Zurück zum Zitat Böhm, C., Hofer, M., Pribyl, W.: A microcontroller sram-puf. In: 2011 5th International Conference on Network and System Security (NSS), pp. 269–273. IEEE (2011) Böhm, C., Hofer, M., Pribyl, W.: A microcontroller sram-puf. In: 2011 5th International Conference on Network and System Security (NSS), pp. 269–273. IEEE (2011)
11.
Zurück zum Zitat Cilardo, A., Barbareschi, M., Mazzeo, A.: Secure distribution infrastructure for hardware digital contents. CDT, IET 8(6), 300–310 (2014) Cilardo, A., Barbareschi, M., Mazzeo, A.: Secure distribution infrastructure for hardware digital contents. CDT, IET 8(6), 300–310 (2014)
12.
Zurück zum Zitat Claes, M., van der Leest, V., Braeken, A.: Comparison of sram and ff puf in 65nm technology. In: Information Security Technology for Applications, pp. 47–64. Springer (2011) Claes, M., van der Leest, V., Braeken, A.: Comparison of sram and ff puf in 65nm technology. In: Information Security Technology for Applications, pp. 47–64. Springer (2011)
13.
Zurück zum Zitat Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. Springer (2007) Guajardo, J., Kumar, S.S., Schrijen, G.J., Tuyls, P.: FPGA Intrinsic PUFs and Their Use for IP Protection. Springer (2007)
14.
Zurück zum Zitat Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S.: Toward trusted wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 7(1), 5 (2010) Hu, W., Tan, H., Corke, P., Shih, W.C., Jha, S.: Toward trusted wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 7(1), 5 (2010)
15.
Zurück zum Zitat Lee, Y.S., Lee, H.J., Alasaarela, E.: Mutual authentication in wireless body sensor networks (wbsn) based on physical unclonable function (puf). In: 2013 9th International Wireless Communications and Mobile Computing, pp. 1314–1318. IEEE (2013) Lee, Y.S., Lee, H.J., Alasaarela, E.: Mutual authentication in wireless body sensor networks (wbsn) based on physical unclonable function (puf). In: 2013 9th International Wireless Communications and Mobile Computing, pp. 1314–1318. IEEE (2013)
16.
Zurück zum Zitat Liu, W., Zhang, Z., Li, M., Liu, Z.: A trustworthy key generation prototype based on ddr3 puf for wireless sensor networks. Sensors 14(7), 11542–11556 (2014)MathSciNetCrossRef Liu, W., Zhang, Z., Li, M., Liu, Z.: A trustworthy key generation prototype based on ddr3 puf for wireless sensor networks. Sensors 14(7), 11542–11556 (2014)MathSciNetCrossRef
17.
Zurück zum Zitat Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from ip-ops on reconfigurable devices. In: Proceedings of Benelux Information and System Security, Eindhoven (2008) Maes, R., Tuyls, P., Verbauwhede, I.: Intrinsic pufs from ip-ops on reconfigurable devices. In: Proceedings of Benelux Information and System Security, Eindhoven (2008)
18.
Zurück zum Zitat Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC press (1996) Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC press (1996)
19.
Zurück zum Zitat Rampon, J., Perillat, R., Torres, L., Benoit, P., Di Natale, G., Barbareschi, M.: Digital right management for ip protection. In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2015, pp. 200–203. IEEE (2015) Rampon, J., Perillat, R., Torres, L., Benoit, P., Di Natale, G., Barbareschi, M.: Digital right management for ip protection. In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2015, pp. 200–203. IEEE (2015)
20.
Zurück zum Zitat STMicroelectronics: RM0090 Reference Manual, 10 (2015) STMicroelectronics: RM0090 Reference Manual, 10 (2015)
21.
Zurück zum Zitat Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, pp. 9–14. ACM (2007) Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th annual Design Automation Conference, pp. 9–14. ACM (2007)
22.
Zurück zum Zitat Vatajelu, I., Di Natale, G., Barbareschi, M., Torres, L., Indaco, M., Prinetto, P.: Stt-mram-based puf architecture exploiting magnetic tunnel junction fabrication-induced variability. ACM J. Emerg. Technol. Comput. Syst. 12(4) (2015) Vatajelu, I., Di Natale, G., Barbareschi, M., Torres, L., Indaco, M., Prinetto, P.: Stt-mram-based puf architecture exploiting magnetic tunnel junction fabrication-induced variability. ACM J. Emerg. Technol. Comput. Syst. 12(4) (2015)
23.
Zurück zum Zitat Yang, K., Zheng, K., Guo, Y., Wei, D.: Puf-based node mutual authentication scheme for delay tolerant mobile sensor network. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4. IEEE (2011) Yang, K., Zheng, K., Guo, Y., Wei, D.: Puf-based node mutual authentication scheme for delay tolerant mobile sensor network. In: 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4. IEEE (2011)
Metadaten
Titel
How to Manage Keys and Reconfiguration in WSNs Exploiting SRAM Based PUFs
verfasst von
Domenico Amelino
Mario Barbareschi
Ermanno Battista
Antonino Mazzeo
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-39345-2_10