Cargando…

A novel IoT sensor authentication using HaLo extraction method and memory chip variability

Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security fe...

Descripción completa

Detalles Bibliográficos
Autores principales: Gordon, Holden, Lyp, Thomas, Kimbro, Calvin, Tehranipoor, Sara
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8527440/
http://dx.doi.org/10.1007/s43926-021-00019-2
_version_ 1784586068261076992
author Gordon, Holden
Lyp, Thomas
Kimbro, Calvin
Tehranipoor, Sara
author_facet Gordon, Holden
Lyp, Thomas
Kimbro, Calvin
Tehranipoor, Sara
author_sort Gordon, Holden
collection PubMed
description Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security features such as larger keys and trusted third parties. While many new processors can handle these more complex encryption algorithms, IoT devices on the edge often struggle to keep up with resource intensive encryption standards. In order to meet this demand for lightweight, secure encryption on the edge, this paper proposes a novel solution, called the High and Low (HaLo) method, that generates Physical Unclonable Function (PUF) signatures based on process variations within flash memory. These PUF signatures can be used to uniquely identify and authenticate remote sensors, and help ensure that messages being sent from remote sensors are encrypted adequately without requiring computationally expensive methods. The HaLo method consumes 20x less power than conventional authentication schemes commonly used with IoT devices, it has an average latency of only 39ms for 512 bit signature generation, and the average error rate is below 0.06%. Due to its low latency, low error rate, and high power efficiency, the HaLo method can progress the field of IoT encryption standards by accurately and efficiently authenticating remote sensors without sacrificing encryption integrity.
format Online
Article
Text
id pubmed-8527440
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-85274402021-10-20 A novel IoT sensor authentication using HaLo extraction method and memory chip variability Gordon, Holden Lyp, Thomas Kimbro, Calvin Tehranipoor, Sara Discov Internet Things Research Since the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security features such as larger keys and trusted third parties. While many new processors can handle these more complex encryption algorithms, IoT devices on the edge often struggle to keep up with resource intensive encryption standards. In order to meet this demand for lightweight, secure encryption on the edge, this paper proposes a novel solution, called the High and Low (HaLo) method, that generates Physical Unclonable Function (PUF) signatures based on process variations within flash memory. These PUF signatures can be used to uniquely identify and authenticate remote sensors, and help ensure that messages being sent from remote sensors are encrypted adequately without requiring computationally expensive methods. The HaLo method consumes 20x less power than conventional authentication schemes commonly used with IoT devices, it has an average latency of only 39ms for 512 bit signature generation, and the average error rate is below 0.06%. Due to its low latency, low error rate, and high power efficiency, the HaLo method can progress the field of IoT encryption standards by accurately and efficiently authenticating remote sensors without sacrificing encryption integrity. Springer International Publishing 2021-10-20 2021 /pmc/articles/PMC8527440/ http://dx.doi.org/10.1007/s43926-021-00019-2 Text en © The Author(s) 2021 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
Gordon, Holden
Lyp, Thomas
Kimbro, Calvin
Tehranipoor, Sara
A novel IoT sensor authentication using HaLo extraction method and memory chip variability
title A novel IoT sensor authentication using HaLo extraction method and memory chip variability
title_full A novel IoT sensor authentication using HaLo extraction method and memory chip variability
title_fullStr A novel IoT sensor authentication using HaLo extraction method and memory chip variability
title_full_unstemmed A novel IoT sensor authentication using HaLo extraction method and memory chip variability
title_short A novel IoT sensor authentication using HaLo extraction method and memory chip variability
title_sort novel iot sensor authentication using halo extraction method and memory chip variability
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8527440/
http://dx.doi.org/10.1007/s43926-021-00019-2
work_keys_str_mv AT gordonholden anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT lypthomas anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT kimbrocalvin anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT tehranipoorsara anoveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT gordonholden noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT lypthomas noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT kimbrocalvin noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability
AT tehranipoorsara noveliotsensorauthenticationusinghaloextractionmethodandmemorychipvariability