Abstract

Because the development of the Internet of Things (IoT) requires technology that transfers information between objects without human intervention, the core of IoT security will be secure authentication between devices or between devices and servers. Software-based authentication may be a security vulnerability in IoT, but hardware-based security technology can provide a strong security environment. Physical unclonable functions (PUFs) are hardware security element suitable for lightweight applications. PUFs can generate challenge–response pairs(CRPs) that cannot be controlled or predicted by utilizing inherent physical variations that occur in the manufacturing process. In particular, the pulsewidth-based memristive PUF (pm-PUF) improves security performance by applying different write pulse widths and bank structures. Bloom filters (BFs) are probabilistic data structures that answer membership queries using small memories. Bloom filters can improve search performance and reduce memory usage and are used in areas such as networking, security, big data, and IoT. In this paper, we propose a structure that applies Bloom filters based on the pm-PUF to reduce PUF data transmission errors. The proposed structure uses two different Bloom filter types that store different information and that are located in front of and behind the pm-PUF, reducing unnecessary access by removing challenges from attacker access. Simulation results show that the proposed structure decreases the data transmission error rate and reuse rate as the Bloom filter size increases; the simulation results also show that the proposed structure improves pm-PUF security with a very small Bloom filter memory.

Highlights

  • The advent of the Internet of Things (IoT) has led to a web of connections that provides network infrastructure and shares a massive amount of private information among smart devices [1].The requirements for trustworthy communication have been one of the biggest concerns [2].In recent years, it has been demonstrated that hardware-based security systems are more secure than software-based security systems due to innate architectural risks in software [3]

  • Two different types of Bloom filters are used, the PUF database Bloom filter (PDBF) and challenge–response pair Bloom filter (CRPBF), that store information about the challenge and response of the authentication server; the structure detects arbitrary challenge attacks and reduces error rates originating from the instability of the Physical unclonable functions (PUFs)

  • At the front of the configuration, the PDBF identifies whether an input challenge is valid by satisfying two conditions before applying it to pulsewidth-based memristive PUF (pm-PUF) directly; one condition is that the challenge is to be included in the challenge–response pairs (CRPs) table shared by the authentication server, and the other condition is that it should not have been previously used for authentication

Read more

Summary

A Novel Hardware Security Architecture for IoT

Device: PD-CRP (PUF Database and Challenge–Response Pair) Bloom Filter on Memristor-Based PUF. Jungwon Lee 1 , Seoyeon Choi 1,2 , Dayoung Kim 1,2 , Yunyoung Choi 1 and Wookyung Sun 3, *. Smart Factory Multidisciplinary Program, Ewha Womans University, Seoul 03760, Korea. Received: 24 August 2020; Accepted: 21 September 2020; Published: 24 September 2020

Introduction
Conventional PUF and Memristor-Based PUF
Bloom Filter
Proposed Structure
Data Set Analysis for Simulation
Performance Evaluation
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call