Cargando…

On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices

The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of n...

Descripción completa

Detalles Bibliográficos
Autores principales: Rojas-Muñoz, Luis F., Sánchez-Solano, Santiago, Martínez-Rodríguez, Macarena C., Brox, Piedad
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144530/
https://www.ncbi.nlm.nih.gov/pubmed/37112412
http://dx.doi.org/10.3390/s23084070
_version_ 1785034121842524160
author Rojas-Muñoz, Luis F.
Sánchez-Solano, Santiago
Martínez-Rodríguez, Macarena C.
Brox, Piedad
author_facet Rojas-Muñoz, Luis F.
Sánchez-Solano, Santiago
Martínez-Rodríguez, Macarena C.
Brox, Piedad
author_sort Rojas-Muñoz, Luis F.
collection PubMed
description The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of new security primitives, suitable for resource-limited devices, can facilitate the inclusion of mechanisms and protocols to ensure the integrity and privacy of the data exchanged over the Internet. On the other hand, the development of techniques and tools to evaluate the quality of the proposed solutions as a step prior to their deployment, as well as to monitor their behavior once in operation against possible changes in operating conditions arising naturally or as a consequence of a stress situation forced by an attacker. To address these challenges, this paper first describes the design of a security primitive that plays an important role as a component of a hardware-based root of trust, as it can act as a source of entropy for True Random Number Generation (TRNG) or as a Physical Unclonable Function (PUF) to facilitate the generation of identifiers linked to the device on which it is implemented. The work also illustrates different software components that allow carrying out a self-assessment strategy to characterize and validate the performance of this primitive in its dual functionality, as well as to monitor possible changes in security levels that may occur during operation as a result of device aging and variations in power supply or operating temperature. The designed PUF/TRNG is provided as a configurable IP module, which takes advantage of the internal architecture of the Xilinx Series-7 and Zynq-7000 programmable devices and incorporates an AXI4-based standard interface to facilitate its interaction with soft- and hard-core processing systems. Several test systems that contain different instances of the IP have been implemented and subjected to an exhaustive set of on-line tests to obtain the metrics that determine its quality in terms of uniqueness, reliability, and entropy characteristics. The results obtained prove that the proposed module is a suitable candidate for various security applications. As an example, an implementation that uses less than 5% of the resources of a low-cost programmable device is capable of obfuscating and recovering 512-bit cryptographic keys with virtually zero error rate.
format Online
Article
Text
id pubmed-10144530
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101445302023-04-29 On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices Rojas-Muñoz, Luis F. Sánchez-Solano, Santiago Martínez-Rodríguez, Macarena C. Brox, Piedad Sensors (Basel) Article The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and developers of products. On the one hand, the design of new security primitives, suitable for resource-limited devices, can facilitate the inclusion of mechanisms and protocols to ensure the integrity and privacy of the data exchanged over the Internet. On the other hand, the development of techniques and tools to evaluate the quality of the proposed solutions as a step prior to their deployment, as well as to monitor their behavior once in operation against possible changes in operating conditions arising naturally or as a consequence of a stress situation forced by an attacker. To address these challenges, this paper first describes the design of a security primitive that plays an important role as a component of a hardware-based root of trust, as it can act as a source of entropy for True Random Number Generation (TRNG) or as a Physical Unclonable Function (PUF) to facilitate the generation of identifiers linked to the device on which it is implemented. The work also illustrates different software components that allow carrying out a self-assessment strategy to characterize and validate the performance of this primitive in its dual functionality, as well as to monitor possible changes in security levels that may occur during operation as a result of device aging and variations in power supply or operating temperature. The designed PUF/TRNG is provided as a configurable IP module, which takes advantage of the internal architecture of the Xilinx Series-7 and Zynq-7000 programmable devices and incorporates an AXI4-based standard interface to facilitate its interaction with soft- and hard-core processing systems. Several test systems that contain different instances of the IP have been implemented and subjected to an exhaustive set of on-line tests to obtain the metrics that determine its quality in terms of uniqueness, reliability, and entropy characteristics. The results obtained prove that the proposed module is a suitable candidate for various security applications. As an example, an implementation that uses less than 5% of the resources of a low-cost programmable device is capable of obfuscating and recovering 512-bit cryptographic keys with virtually zero error rate. MDPI 2023-04-18 /pmc/articles/PMC10144530/ /pubmed/37112412 http://dx.doi.org/10.3390/s23084070 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Rojas-Muñoz, Luis F.
Sánchez-Solano, Santiago
Martínez-Rodríguez, Macarena C.
Brox, Piedad
On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
title On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
title_full On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
title_fullStr On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
title_full_unstemmed On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
title_short On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices
title_sort on-line evaluation and monitoring of security features of an ro-based puf/trng for iot devices
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10144530/
https://www.ncbi.nlm.nih.gov/pubmed/37112412
http://dx.doi.org/10.3390/s23084070
work_keys_str_mv AT rojasmunozluisf onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices
AT sanchezsolanosantiago onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices
AT martinezrodriguezmacarenac onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices
AT broxpiedad onlineevaluationandmonitoringofsecurityfeaturesofanrobasedpuftrngforiotdevices