Abstract
Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security features such as larger keys and trusted third parties. While many new processors can handle these more complex encryption algorithms, IoT devices on the edge often struggle to keep up with resource intensive encryption standards. In order to meet this demand for lightweight, secure encryption on the edge, this paper proposes a novel solution, called the High and Low (HaLo) method, that generates Physical Unclonable Function (PUF) signatures based on process variations within flash memory. These PUF signatures can be used to uniquely identify and authenticate remote sensors, and help ensure that messages being sent from remote sensors are encrypted adequately without requiring computationally expensive methods. The HaLo method consumes 20x less power than conventional authentication schemes commonly used with IoT devices, it has an average latency of only 39ms for 512 bit signature generation, and the average error rate is below 0.06%. Due to its low latency, low error rate, and high power efficiency, the HaLo method can progress the field of IoT encryption standards by accurately and efficiently authenticating remote sensors without sacrificing encryption integrity.
Highlights
Internet of Things (IoT) sensors have seen explosive growth over the last twenty years
The main characteristics of the High and Low (HaLo) Physical Unclonable Function (PUF) extraction method are its reliability over multiple challenges, the uniqueness of signatures on every page, and the minimal time required in order to generate a signature
As medical care continues to improve in both effectiveness and accessibility on a global scale, remote patient monitoring is a logical step for healthcare investment
Summary
Internet of Things (IoT) sensors have seen explosive growth over the last twenty years. The consumer IoT market is estimated to reach 142 billion dollars by 2026 at a compound annual growth rate of 17%. Estimates forecast that by 2025, there will be 152,200 IoT devices connecting to the internet every single minute. Malware attacks targeting IoT devices have increased by 30% , and 76% of IoT risk professionals believe that their organization’s IoT security posture leaves them vulnerable. This is important for the IoT devices used as medical sensors in telehealth applications
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have