2018
DOI: 10.3390/s18082429
|View full text |Cite
|
Sign up to set email alerts
|

A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes

Abstract: Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them. The drawback is that secure storage of secret keys is required. In this work, a low-cost solution is presented to obfuscate secret keys with Physically Unclonable Functions (PUFs), which exploit the hardware identity of the node. In addition, a lightweight fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…Manufacturing process variations are unique of each SRAM, unpredictable, and difficult to be cloned physically or modeled mathematically. Hence, the bit strings composed of SRAM start-up values meet the requirements of PUF responses [ 28 , 33 , 34 , 35 ].…”
Section: A Proposal Of Trusted Cameras Based On Sram Pufsmentioning
confidence: 99%
“…Manufacturing process variations are unique of each SRAM, unpredictable, and difficult to be cloned physically or modeled mathematically. Hence, the bit strings composed of SRAM start-up values meet the requirements of PUF responses [ 28 , 33 , 34 , 35 ].…”
Section: A Proposal Of Trusted Cameras Based On Sram Pufsmentioning
confidence: 99%
“…Since the appearance of the PUFs in 2001, several object types were proposed as candidates to PUF systems, such as Optical PUFs [19,20], Image-based PUFs [21,22], Coating PUFs [23,24], Silicon PUFs [25], SRAM (Static Random Access Memory) PUFs [26][27][28][29], Paper PUFs [8,30], Arbiter PUFs [31], Reconfigurable PUFs [32], Ring Oscillator Pufs [33,34], RFID (Radio-Frequency Identification) PUFs [35], among others. This work focuses on image-based PUFs because as the authors are interested in its scope.…”
mentioning
confidence: 99%
“…Besides, the protection is only as strong as its weakest link, once the key is hacked, the last line of defence is torn down. Due to the ease of access of most IoT devices, storing the key in non-volatile storage has proven to be vulnerable to various forms of non-invasive, semi-invasive and invasive attacks [3] [60]. In this light, silicon PUF emerges as a burgeoning technology for IoT security.…”
Section: Resultsmentioning
confidence: 99%
“…With unclonability arises from the hardness of reproducing the multitude of uncontrollable manufacturing process parameters, PUF is touted as a promising new technology for building hardware root of trust with lightweight crypto for robust authentication between devices, and establish trust for data being read or written into an IoT endpoint without the need for stored keys, expensive secure memory and anti-tamper technologies. Over years, a vast multifarious of PUFs have been developed [57]- [60]. Some of which have been successfully commercialized, notably for generating the essential part of a self-sovereign identity, the private key, in a tamper-proof manner.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation