Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Title | Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security |
Publication Type | Journal Article |
Year of Publication | 2020 |
Authors | Zhang, Jiliang, Qu, Gang |
Journal | IEEE Transactions on Industrial Electronics |
Volume | 67 |
Pagination | 7025—7033 |
ISSN | 1557-9948 |
Keywords | authentication, battery power, chip fabrication process, chip-unique key, computer network security, copy protection, crossover RO PUF, cryptographic protocols, cryptography, delays, device authentication, I-O Systems, i-o systems security, industry Internet of Things, Internet of Things, interstage crossing structure, Inverters, IoT security, key generation, Key-sharing, learning (artificial intelligence), lightweight key sharing protocols, lightweight security primitive, lookup table, LUT, machine learning, machine learning (ML), one-to-one input-output mapping, physical unclonable function, physical unclonable function (PUF), physical unclonable function-based key sharing, private key cryptography, Protocols, pubcrawl, PUF-based key sharing method, resource-constrained devices, Ring Oscillator, Scalability, security, security protocols, shared key, silicon physical unclonable function, Table lookup |
Abstract | In many industry Internet of Things applications, resources like CPU, memory, and battery power are limited and cannot afford the classic cryptographic security solutions. Silicon physical unclonable function (PUF) is a lightweight security primitive that exploits manufacturing variations during the chip fabrication process for key generation and/or device authentication. However, traditional weak PUFs such as ring oscillator (RO) PUF generate chip-unique key for each device, which restricts their application in security protocols where the same key is required to be shared in resource-constrained devices. In this article, in order to address this issue, we propose a PUF-based key sharing method for the first time. The basic idea is to implement one-to-one input-output mapping with lookup table (LUT)-based interstage crossing structures in each level of inverters of RO PUF. Individual customization on configuration bits of interstage crossing structure and different RO selections with challenges bring high flexibility. Therefore, with the flexible configuration of interstage crossing structures and challenges, crossover RO PUF can generate the same shared key for resource-constrained devices, which enables a new application for lightweight key sharing protocols. |
URL | https://ieeexplore.ieee.org/document/8825835 |
DOI | 10.1109/TIE.2019.2938462 |
Citation Key | zhang_physical_2020 |
- Protocols
- lightweight security primitive
- lookup table
- LUT
- machine learning
- machine learning (ML)
- one-to-one input-output mapping
- Physical Unclonable Function
- physical unclonable function (PUF)
- physical unclonable function-based key sharing
- private key cryptography
- lightweight key sharing protocols
- pubcrawl
- PUF-based key sharing method
- resource-constrained devices
- Ring Oscillator
- Scalability
- security
- security protocols
- shared key
- silicon physical unclonable function
- Table lookup
- I-O Systems
- battery power
- chip fabrication process
- chip-unique key
- computer network security
- copy protection
- crossover RO PUF
- Cryptographic Protocols
- Cryptography
- delays
- device authentication
- authentication
- i-o systems security
- industry Internet of Things
- Internet of Things
- interstage crossing structure
- Inverters
- IoT security
- key generation
- Key-sharing
- learning (artificial intelligence)