Cargando…
On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of n...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144530/ https://www.ncbi.nlm.nih.gov/pubmed/37112412 http://dx.doi.org/10.3390/s23084070 |
_version_ | 1785034121842524160 |
---|---|
author | Rojas-Muñoz, Luis F. Sánchez-Solano, Santiago Martínez-Rodríguez, Macarena C. Brox, Piedad |
author_facet | Rojas-Muñoz, Luis F. Sánchez-Solano, Santiago Martínez-Rodríguez, Macarena C. Brox, Piedad |
author_sort | Rojas-Muñoz, Luis F. |
collection | PubMed |
description | The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of new security primitives, suitable for resource-limited devices, can facilitate the inclusion of mechanisms and protocols to ensure the integrity and privacy of the data exchanged over the Internet. On the other hand, the development of techniques and tools to evaluate the quality of the proposed solutions as a step prior to their deployment, as well as to monitor their behavior once in operation against possible changes in operating conditions arising naturally or as a consequence of a stress situation forced by an attacker. To address these challenges, this paper first describes the design of a security primitive that plays an important role as a component of a hardware-based root of trust, as it can act as a source of entropy for True Random Number Generation (TRNG) or as a Physical Unclonable Function (PUF) to facilitate the generation of identifiers linked to the device on which it is implemented. The work also illustrates different software components that allow carrying out a self-assessment strategy to characterize and validate the performance of this primitive in its dual functionality, as well as to monitor possible changes in security levels that may occur during operation as a result of device aging and variations in power supply or operating temperature. The designed PUF/TRNG is provided as a configurable IP module, which takes advantage of the internal architecture of the Xilinx Series-7 and Zynq-7000 programmable devices and incorporates an AXI4-based standard interface to facilitate its interaction with soft- and hard-core processing systems. Several test systems that contain different instances of the IP have been implemented and subjected to an exhaustive set of on-line tests to obtain the metrics that determine its quality in terms of uniqueness, reliability, and entropy characteristics. The results obtained prove that the proposed module is a suitable candidate for various security applications. As an example, an implementation that uses less than 5% of the resources of a low-cost programmable device is capable of obfuscating and recovering 512-bit cryptographic keys with virtually zero error rate. |
format | Online Article Text |
id | pubmed-10144530 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101445302023-04-29 On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices Rojas-Muñoz, Luis F. Sánchez-Solano, Santiago Martínez-Rodríguez, Macarena C. Brox, Piedad Sensors (Basel) Article The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of new security primitives, suitable for resource-limited devices, can facilitate the inclusion of mechanisms and protocols to ensure the integrity and privacy of the data exchanged over the Internet. On the other hand, the development of techniques and tools to evaluate the quality of the proposed solutions as a step prior to their deployment, as well as to monitor their behavior once in operation against possible changes in operating conditions arising naturally or as a consequence of a stress situation forced by an attacker. To address these challenges, this paper first describes the design of a security primitive that plays an important role as a component of a hardware-based root of trust, as it can act as a source of entropy for True Random Number Generation (TRNG) or as a Physical Unclonable Function (PUF) to facilitate the generation of identifiers linked to the device on which it is implemented. The work also illustrates different software components that allow carrying out a self-assessment strategy to characterize and validate the performance of this primitive in its dual functionality, as well as to monitor possible changes in security levels that may occur during operation as a result of device aging and variations in power supply or operating temperature. The designed PUF/TRNG is provided as a configurable IP module, which takes advantage of the internal architecture of the Xilinx Series-7 and Zynq-7000 programmable devices and incorporates an AXI4-based standard interface to facilitate its interaction with soft- and hard-core processing systems. Several test systems that contain different instances of the IP have been implemented and subjected to an exhaustive set of on-line tests to obtain the metrics that determine its quality in terms of uniqueness, reliability, and entropy characteristics. The results obtained prove that the proposed module is a suitable candidate for various security applications. As an example, an implementation that uses less than 5% of the resources of a low-cost programmable device is capable of obfuscating and recovering 512-bit cryptographic keys with virtually zero error rate. MDPI 2023-04-18 /pmc/articles/PMC10144530/ /pubmed/37112412 http://dx.doi.org/10.3390/s23084070 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Rojas-Muñoz, Luis F. Sánchez-Solano, Santiago Martínez-Rodríguez, Macarena C. Brox, Piedad On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices |
title | On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices |
title_full | On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices |
title_fullStr | On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices |
title_full_unstemmed | On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices |
title_short | On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices |
title_sort | on-line evaluation and monitoring of security features of an ro-based puf/trng for iot devices |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144530/ https://www.ncbi.nlm.nih.gov/pubmed/37112412 http://dx.doi.org/10.3390/s23084070 |
work_keys_str_mv | AT rojasmunozluisf onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices AT sanchezsolanosantiago onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices AT martinezrodriguezmacarenac onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices AT broxpiedad onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices |